MN502 Security in Networked Systems Assignment

Assignment Help Computer Network Security
Reference no: EM132518885 , Length: word count:2500

MN502 Security in Networked Systems - Melbourne Institute of Technology

Purpose

LO1. Explain the major methodologies for secure networks and what threats they address;
LO2. Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description

Blue Ridge Consulting Services (BRCS) provides security consulting and services to over 1000 clients across a wide range of enterprises in Australia. A new initiative at BRCS is for its two offices in Sydney and Melbourne to provide internships to groups of students who are pursuing their postgraduate studies in reputed institutes in Sydney and Melbourne in the Networking and Cyber Security domains.

Student groups are required to demonstrate outstanding writing and presentation skills about thier theoretical as well as practical knowledge related to information security. Further, groups must demonstrate excellent teamwork and collaboration skills.

To evaluate suitable candidates/groups for this prestigious internship program, BRCS has advised student groups from multiple institutes to prepare a detailed report and a video demonstration of two penetration tools. Detailed description of these two parts is given in following sections.

Section I: Report (2500-3000 Words)
The report must include following sections:

A. Preventing Vishing Attacks (700 Words)
Vishing, or voice phishing, continues to increase as an attack against users. What would you do to help prevent users from becoming victims? First, access the online SoundCloud repository by NumberCop that contains five different recordings for vishing attacks. After listening to several of the recordings, based on your analysis address following:

1. What attackers typically ask and how they craft their attacks?
2. What messages do the attacker commonly use?
3. How do they trick users into entering the information?
4. Write your recommendations that would help users resist these attacks.

B. Block Cipher Modes of Operations (700 Words)
A block cipher manipulates an entire block of plaintext at one time. Block cipher mode of operation specifies how block ciphers should handle these blocks. Most common modes are Electronic Code Book (ECB), Cipher Block Chaining (CBC), Counter (CTR), and Galois/Counter (GCM). Research block cipher modes of operation. Based on your research and analysis

1. Explain the working mechanism of ECB. How ECB can be compromised.
2. Discuss in detail two modes of operation (CBC, CRT, and GCM). With the help of diagrams, explain how these modes convert plaintext into ciphertext.
3. Which mode would you recommend for encryption? Justify your recommendation.

C. Terminal Access Control Access Control Systems (700 Words)
A user accessing a computer system must present credentials or identification when logging in to the system. Different services can be used to provide identity and access services. Terminal Access Control Access Control Systems+ (TACACS+) is one such important service.

1. With the help of a diagram, discuss how does TACACS+ work?
2. In what settings it is most likely to be found? How widespread is its usage?
3. What are its advantages and disadvantages?
4. When would you recommend using TACACS+ over Kerberos? Justify your recommendation by comparing different features supported by both services.

D. Cyber Physical System: Smart Grid (700 Words)
Smart Grid is one of the Cyber Physical System technologies, which develops and implements measurement science underpinning modernisation of the Nation's electrical power system (electric grid) in order to improve system efficiency, reliability and sustainability, by incorporating distributed intelligence, bi-directional communications and power flows, and additional advancements. Based on your research

1. Discuss smart Grid network architecture (System Component and Network Components), Recent developments in Smart Grid networks.
2. Analyse the importance of cybersecurity in Smart Grid networks
3. Analyse critically, two current or possible future security issues in Smart Grid networks.
4. Propose a possible solution for one of the threats identified

E. References
Must consider at least 10 current references from journal/conference papers and books. Must follow IEEE style.

Section II: Video Demonstration (5-7 Minutes)
A Penetration testing, also called pen testing or ethical hacking, is a mechanism of testing a computer system, network or web application to determine security vulnerabilities that an attacker could exploit. Burp Suite and OWASP Zed Attack Proxy (ZAP) are two penetration testing tools for web applications having similar features.

As a team of four, create a 5-7 minutes video demo using Zoom application (along with presenters' video) addressing following tasks.

1. Analyse and compare features of these tools.
2. Download and install each selected tool on your personal /lab computer using Virtual machine (Kali Linux /Windows) in Virtual Box. Perform and explain penetration testing against two vulnerable web applications.
3. Which tool among these two would you recommend? Justify your recommendation.

Attachment:- Security in Networked Systems.rar

Reference no: EM132518885

Questions Cloud

Performance appraisals : Managers are often overwhelmed by their day-to-day activities and postpone important aspects of their jobs, including performance appraisals.
Write a response from carla to jim : Write a response from Carla to Jim, repeating her request to visit BlackBoard Inc.. Adopt the same style and tone that Carla used in her first e-mail.
Describe what creativity is : Describe what it is that you think makes the example "creative" and briefly describe what you think creativity is. Is creativity a quality?
Explain what is meant by the culture of a society : Now research your selected term in the university's electronic library from only academic (refereed) journals. Explain what is meant by the culture of a society
MN502 Security in Networked Systems Assignment : MN502 Security in Networked Systems Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service
Discuss value associated with sport and the dominant values : To what extent are these sets of values consistent with each other? Do any of the sport-related values conflict with any of the national values?
Ensuring safe and health work environment : Explain the purpose of OSHA and how employers can create safe work environments in healthcare. What safety concerns have you seen in news related to healthcare
Discuss the importance of reputation management : Write a paper that discusses the importance of reputation management in relation to an organization's credibility. If a PR person only has their credibility.
Measure the impact of covid-19 on economic activity : Discuss the pros and cons of using GDP to measure the impact of COVID-19 on economic activity.

Reviews

len2518885

5/18/2020 9:43:43 PM

This assignment is for master of networking.u need to follow marketing criteria. U also need to give me speaking outline for part 2.

Write a Review

Computer Network Security Questions & Answers

  What is the application layer protocol involved

What is its transmission distance from radio to radio - What is the security method used and discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not.

  Describe some of the defenses against buffer overflows

List and briefly describe some of the defenses against buffer overflows that can be implemented when running existing, vulnerable programs.

  Develop a network security policy for a global organization

Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and researched to design and outline the policy.

  Access and read e-mail from government web sites

He wants to utilize a variety of electronic tablets to access and read e-mail from government web sites (Note: Coast Guard is dual-hatted -Department of Defense and Department of Homeland Security). He has been briefed on a variety of mobile devic..

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  Prepare briefing package with technology policies and plans

CSIA 413: Cybersecurity Policy, Plans, and Programs Project: Employee Handbook. Prepare briefing package with approval drafts of the three IT related policies

  Summarize the current state of web application security

Summarize the current state of Web application security for your Board of Directors to understand. Determine any common themes that need to be addressed specific to the Web security.

  What are pros and cons of remote logging

Why is logging important? What are its limitations as a security control? What are pros and cons of remote logging?

  Automated digital job application system

List down disadvantages that come about having an automated digital job application system

  Discuss a situation where you received security education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?

  Integrative network design project

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project.

  Description of a couple of cloud services

Develop a paper for him, at least 2 pages (1.5 spaced) in length, font 12, that discusses the different types of cloud computing, provide him with the description of a couple of cloud services which would be applicable to email, one of them which ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd