Reference no: EM131496318
Network Security
Purpose of the assessment (with ULO Mapping) After completing this assessment, student's should be able to:
- Understand network scanning and security policies to manage operational security at workplace. Then administer those policies to ensure compliance by users in an organization.
- Apply skills to analyse complex problems in network security under supervision.
Assessment Description
After undertaking initial stealthy reconnaissance to identify IP address spaces of interest, network scanning is an intrusive and aggressive process used to identify accessible hosts and their network services. Performing both network scanning and reconnaissance tasks paints a clear picture of the network topology and its security features. The rationale behind IP network scanning is to gain insight into the following elements of a given network:
- ICMP message types that generate responses from target hosts
- Accessible TCP and UDP network services running on the target hosts
- Operating platforms of target hosts and their configurations
- Areas of vulnerability within target host IP stack implementations (including sequence number predictability for TCP spoofing and session hijacking)
- Configuration of filtering and security systems (including firewalls, border routers, switches, and IDS/IPS mechanisms)
Source: Chris McNab (2008), Network Security Assessment, O'Reilly 2nd Edition
This assessment requires you to do literature search on internet, magazines, publications, textbook etc. This is an individual assignment, therefore it is very important to write the findings in your own words.
Choose ONE of the following topics:
1) ICMP Probing
2) TCP Port Scanning
3) UDP Port Scanning
4) IDS/IPS Evasion
5) Low Level IP Assessment
At minimum your report should address the following:
A) Discuss your chosen topic.
B) Explain what kind of security measures/threats it provides to the network.
C) Identify three security vulnerabilities.
D) Discuss how these threats can be mitigated.
E) Conclusion/Summarize.
Identification and summary of results of leadership actions
: You will be evaluated on the analysis of executive team-building practices, theory, concepts and techniques; identification and summary of results of leadership
|
What dependencies may the moves have involved
: Reflect on Ikea's decision to invest in Russia, and its attempts to enter India. What risks, uncertainties or ambiguities were probably associated.
|
Discuss the types of tort if any sam committed
: Discuss types of tort, if any, Sam committed. Did any of other parties in this scenario commit a torte. Discuss if Sam's, actions are ethical. Why or why not?
|
Identify decision requiring one of these approaches
: Here are some decisions which Virgin (see Part case) has faced: Whether or not to order further airliners.
|
Operating platforms of target hosts and their configurations
: Operating platforms of target hosts and their configurations and areas of vulnerability within target host IP stack implementations
|
Began construction of new warehouse
: On January 1, 2016, Dreamworld Co. began construction of a new warehouse. The building was finished and ready for use on September 30, 2017.
|
The job evaluation process
: Discuss the purpose of job evaluation and the main steps in conducting job evaluation. Discuss the advantages and pitfalls of job analysis.
|
Define the three components of behavior control
: Discuss/define the three components of behavior control. Clearly define each of the concepts. Discuss an organization that you have worked.
|
What are your shares in this firm worth today on per share
: Sweatshirts Unlimited is downsizing. What are your shares in this firm worth today on a per share basis?
|