Vulnerability assessment, network security analysis

Assignment Help Other Subject
Reference no: EM133928341

Network & Information Security

Assessment Details for Assessment Item 2:

Introduction

This individual assignment focuses on vulnerability assessment, network security analysis, and practical application of security tools.
Network Environment Setup (Building on Labs 1-5):

Ensure your virtual network environment, including Windows 10 Enterprise VM, Kali Linux VM, and pfSense firewall with Snort, is fully operational. This is the base for your assessment.
Document your network topology (diagram) and the configurations of each virtual machine.
Vulnerability Scanning (Building on Lab 4):
Utilize Nessus Essentials (or OpenVAS if you prefer) from your Kali Linux VM to perform a vulnerability scan of your Windows 10 Enterprise VM.
Critically analyse the scan results. Specifically address the following:
Identify and categorize the detected vulnerabilities.
Discuss the potential impact of each vulnerability.
Propose mitigation strategies for the prioritized vulnerabilities, such as applying patches, configuration changes, or additional security controls.
Explain the difference between false positives and real vulnerabilities.
Demonstrate your ability to filter and optimize scan results to minimize false positives.
Provide screenshots of your scans and the results.

Assessment 3:

Introduction
This individual assessment task requires you to demonstrate your practical skills in implementing and configuring an Enterprise Antivirus solution within your virtual network environment. You will create a video presentation showcasing the installation, configuration, and effectiveness of your chosen antivirus solution in detecting and blocking malware.

Antivirus Implementation (Building on Lab 5):
Install and configure an Enterprise Antivirus solution, such as the HAVP package with ClamAV, within your pfSense firewall.

Clearly demonstrate the installation process and explain the key configuration settings, including advanced features such as heuristic scanning or real-time monitoring.

Lab5: Installs and configure pfSense

According to Wikipedia and Netgate, "pfSense is a firewall/router computer software distribution based on FreeBSD. The open-source pfSense Community Edition (CE) and pfSense Plus are installed on a physical computer or a virtual machine to create a dedicated firewall/router for a network. It can be configured and upgraded through a web-based interface and requires no knowledge of the underlying FreeBSD system to manage."
We will use pfSense in the course to configure a firewall, a commercial virus guard, a proxy server, as well as an Intrusion Detection System (IDS). Therefore, this lab is crucial for both Assessment 3 and the major assessment.

You have to follow the below screenshots to install pfSence and add your screenshots to the reports.

When installing pfSence, you may follow these links or resources:
pfSense Official Documentation: Official documentation covering installation, configuration, and troubleshooting.

Create the VMprofile to install pfSense. You have to select BSD and FreeBSD as the type and version respectively

Create the below network adapters by going to the settings of the virtual box manager. This is exactly similar to both the Kali and Windows servers we used.

Adapter 1:

- Enable Network Adapter
Attached to: NAT
Adapter 2:
- Enable Network Adapter
Attached to: Internal Network
Name: intnet

Install pfSence by following the necessary steps given in the installation. Youmay follow the instructions below you may refer to the links or the videos given in the introduction.

Do the disk partitioning correctly. If you need more information you may follow the information given in the netgate wiki

Make sure that you select "Swap Size" (S) as two times as your RAM size of the VM. For example, in my VM, I gave 2 GB RAM and I Set the Swap size as 4G. Get expert online assignment help in the USA.
Then proceed with the installation

Once finish with the partitioning and file system configuration, make sure you select the hdd from the install below (* has to be there)

Finalize the setup and let the pfSence to install.

Finalize the installation by clicking to reboot.

After installing, power off the pfsence.
Before running the VM, make sure you remove the iso file you loaded. Else, you will be guided through the installation again. Therefore, it is very important to remove the iso file from the CD ROM and powerup your pfSense.

In the successful installation you will see your pfSense as below
Those who are good at CLI interfaces, can work on the CLI. However, those who are not good at CLI, can use Step 3 to access pfSence.
Enter option 8 and then go to shell.
Then type "ifconfig | less" and check the IP address of the pfSence VM. This has to be in your report. 6
If you wanted to come out of CLI, type "exit"

Access pfSense using GUI to do the Configurations to pfSense
Go to Kali or Windows 10 VMs. Make sure the LAN IP addresses are correct (192.168.1.1/24). Note that this has to be in the LAN network you configured in both Windows (192.168.1.101/24) and Kali (192.168.1.100/24). This is very important.
Go to the browser and type 192.168.1.1 do the configurations below. I recommend using Firefox.
Once you try to access the pfSence, as it is working through http, the browser will let you know that is a dangerous site. But you can go to "Advanced" and accept the risk and then navigate to pfSence.

The defauly Uname is "admin" and the PWD is "pfsense"
Enter the hostname as "ITNE2002"

Do not change the LAN IP Address.
Then follow the on-screen comments and configure the pfSence. You might change the below as you prefer.
Timezone
Change default "admin" PWD to "root"
Finally check for the updates and finish the installation.
Congratulations, you successfully installed an industry-grade firewall. Now Enjoy pfSence.

Malware Detection and Blocking (Building on Lab 4):
Utilize a source of known malware, such as VirusShare or VirusTotal, to obtain sample virus files.
Demonstrate the antivirus solution's ability to detect and block these virus files within your Windows 10 Enterprise VM.
Show the antivirus logs and dashboard, highlighting the detected threats and the actions taken.

Lab 4: Make your Windows VM a Vulnerable PC
In this experiment, you will purposefully make your Windows VM a vulnerable PC by installing services and opening vulnerable ports. Furthermore, we will use a firewall to open several unnecessary ports on your Windows PC. Specifically, you will install and open the following ports:

Open Port 21:
Install an FTP server on Windows 10 by following the instructions at [Windows Central].

Open Port 22
Install the OpenSSH server on a Windows 10 PC. You may use the following link help to configure it
Set the SSH server to start automatically at Windows startup and add the firewall rule.

Open Port 23
Install the telnet client using "Turn Windows features on or off." You may use the link below as a help to do that.

Open Port 80
Install IIS using "Turn Windows features on or off" by following the instructions at [Windows Central]

Find the services associated with port numbers 135, 445, and 3389 in the Windows Services console and set each relevant service to start automatically at Windows startup.
Enable the service.

Open Port 3306
Download and install the XAMPP web server and the MySQL database server, which will open port 3306. You can download XAMPP from [Apache Friends]

Finally, you need to configure the Windows firewall to allow the following applications through the firewall. Do this if the firewall does not already have these rules:

  • SSH
  • IIS
  • Web
  • All services related to Remote Desktop Management

Video Presentation:
Record a video presentation that clearly and concisely demonstrates the following:
The installation and configuration of your chosen antivirus solution.
The process of obtaining and testing diverse malware samples in a simulated real-world attack scenario.
The antivirus solution's detection and blocking capabilities.
An explanation of the key configuration settings and their impact.
Speak clearly and provide a logical flow to your presentation.

Include screen recordings of your virtual machines and antivirus dashboards.

Reference no: EM133928341

Questions Cloud

Why does teaghan even have to make a decision : Is this even something that could happen? Why does Teaghan even have to make a decision? What economic principle is causing this scenario?
Critically discuss and provide insights into the skills : critically discuss and provide insights into the skills, competencies, and behaviours of project managers that underpin project success with consideration
Understanding of socio-behaviourist theory : EPRO201 Theoretical Perspectives and Pedagogy, Ikon Institute - write a paragraph response on your knowledge and understanding of socio-behaviourist theory.
Discuss operations or implementation of the method : Discuss the planning (variables and measurements). Discuss operations or implementation of the method. What data visualization method could be used for results?
Vulnerability assessment, network security analysis : ITNE2002 Network & Information Security, Victorian Institute of Technology - Demonstrate the antivirus solution's ability to detect and block these virus
Identify your own cultural beliefs and values : Identify your own cultural beliefs and values. Discuss the variety of cultures in your professional practice, reflect on your cultural journey
Feeling bit tired after the holidays : Patient History: Patient R was feeling a bit tired after the holidays and seemed to be having a bit of an allergy attack
Josh is feeling achy-congested and lethargic : Josh is feeling achy, congested, and lethargic. Josh's doctor tells him he has been infected with a cold virus and does not consider
Discuss potential bias to the Brown situation : Discuss potential bias to the Brown's situation. How do these biases get developed? Did the physician have any bias toward Mrs. Brown?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd