Identifying network threats using network security tools

Assignment Help Computer Networking
Reference no: EM131991418

Identifying Network Threats using Network Security Tools

Purpose of the assessment (with ULO Mapping) The objective of this assignment is to identify network threats using network security tools.

The purpose of the assignment as per Unit Learning Outcomes:

Explain the major methodologies for secure networks and the threats they address

Identify and report network threats, select and implement appropriate countermeasures for network security

Assignment Description

It is important for networking professionals to stay abreast of new security threats and learn how to address them. In this assignment, your task is to identify and evaluate network security threats that relates to network monitoring. You may, for example, investigate the network in the Institute, at your home or of the Internet by using any network security tool.

Use any TWO open source network monitoring and analysis tool such as GFI LanGuard, Nagios, PRTG, Nmap, Metasploit, Kismet, TCPdump, Open VAS etc. Compare results after scanning your network and discuss on the threats that these tools could be used for network monitoring. Also provide an appropriate mitigation strategies for the selected threats and attacks.

Verified Expert

This assignment is related to the network security study in which we need to do network monitoring and analysis tool such as GFI LanGuard, Nagios, PRTG, Nmap, Metasploit, Kismet, TCPdump, Open VAS etc..It also includes comparing results after scanning the network and discuss on the threats that these tools could be used for network monitoring.

Reference no: EM131991418

Questions Cloud

Amount of learning acquired rise as a result : If the quality of instruction rises from 8 to 10, by how much will the amount of learning acquired rise as a result?
Briefly summarize the documentary : Briefly summarize the documentary. What evidence is used to support the theories/arguments put forth? In other words, discuss the arguments put forth using.
Monopolistic competition and oligopoly : Monopolistic Competition and Oligopoly (gaming systems) we have three major competitors Nintendo, Sony, and Microsoft,
How does the idea of tradeoff relate to opportunity cost : How does the idea of tradeoff relate to opportunity cost. Is there a difference between monetary and non-monetary opportunity costs
Identifying network threats using network security tools : BN203 - - Identifying Network Threats using Network Security Tools - dentify and report network threats, select and implement appropriate countermeasures
Identify the costs of having unemployment levels : Identify the costs of having unemployment levels that are either too high or too low.
Heckscher-ohlin theory : According to the Heckscher-Ohlin theory, two countries that have the same production technologies for the various products that they produce are unlikely
Examine basic components of marketing plan : Examine basic components of marketing plan, including pricing models, promotion, and sales management.
Ancient female rulers : Compare the Tang Empress Wu Zetian (also known as Empress Wu or as Wu Zhao; ruled China around 690-705 AD) with either the Pharaoh Cleopatra

Reviews

len1991418

5/22/2018 1:28:34 AM

Conclusion /2 A very powerful conclusion with full confidence. Very Good Conclusion Appearance made and good conclusion provided Appearance made and conclusion provided. Barely appear at the end of the video. Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1991418

5/22/2018 1:28:29 AM

Network Security Tools /20 Exceptional discussion on security threats for the system with appropriate tools. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security threat for the system with appropriate tools however results not explained in detail. Discussion on security threat are generic and covered some aspect of assessment with relevant tools Discussion on Two security threats using tools are generic and lack detail Unable to clearly explain security threat using tools Threat Mitigation Techniques /10 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation but it needs to be improved. Lacking discussion on threats and mitigation

len1991418

5/22/2018 1:28:24 AM

Marking Rubric: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /3 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /10 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1991418

5/22/2018 1:28:17 AM

Threat Mitigation Techniques Discuss in detail mitigation techniques for the selected vulnerabilities in your report 10 Conclusion Summarize your findings in report with valid comments 2 Reference style Appropriate presentation IEEE referencing style and report 5 Total 50

len1991418

5/22/2018 1:28:12 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Appropriately select tools and discuss how they detect and exploit network vulnerabilities 3 Literature Review Related to your topic, discuss major methodologies related to network security threats and attacks 10 Network Security Tools Discuss how you identify and analyse network security threats using the network security tools. Provide detailed description of all threats with appropriate screenshots. 20

len1991418

5/22/2018 1:28:06 AM

Your results should include and discuss all the devices on your network. After scanning your network, take screenshots of all vulnerabilities on each device and discuss how hacker can exploit these vulnerabilities. This investigation should show originality, and be different from others. If you study with other students, all members of the study group should submit work that is quite different and that investigates different areas. Note: If you would like to choose other network tools that are not listed above, talk to your tutor and get permission to use it.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd