assessment 3 assessment type: practical and written assessment, individual assignment (2000 words). purpose: the purpose of this assignment is to assess the students’ understanding on identifying the...

assessment 3 assessment type: practical and written assessment, individual assignment (2000 words). purpose: the purpose of this assignment is to assess the students’ understanding on identifying the risks, vulnerabilities and awareness of current industry and research trends in the field of information security. students need to exercise operational, analytical, and critical skills in order to reduce the potential security risks involved in the given case study. analyse and evaluate the organizational adoption of security controls. design solutions for concrete security problems for distributed applications. this assessment contributes to learning outcomes a, b, c, d. value: 35% due date: report submission week 11; demonstration week 12 submission requirements details: all work must be submitted on moodle by the due date. reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using harvard anglia referencing style. assessment topic: port scanning, security planning task details: this assignment requires you to perform a scan on the network, prepare a risk mitigation report and configure some of the firewall settings using kali linux to secure the network and the distributed applications. the assignment requires 1 tool as listed below to complete the criteria of this assignment: use nmap - a vulnerability scanning protocol in kali linux- prepare a short risk mitigation plan to identify the threats for the assets. case study for the assignment: an educational institute suffers from very low information security in terms of maturity across many elements of infosec and information assurance, including cyber resilience and application of cybersecurity good practice. data breaches could have the institute puts its reputation at risk, and students expect a high level of protection of their data. it is highly recommended that there is a need to impose a certain level of filtering for the network to be secure so as to sustain from threats and attacks. to add restrictions on a particular network it is necessary to identify the possible threats to the organization. for example, it is necessary to identify the important services that run on the network. in order to get this done, there is a need to perform scanning on the network to identify the services and ports of the applications. furthermore, the firewall needs to be configured by adding rules to block and allow the services based on the requirements of the organization and the security perspectives of the network. part a: with respect to the given study, you need to: - run tcp scan will scan for tcp port like port 22, 21, 23, 445 and ensure for listening port (open) through 3-way handshake connection between the source and destination port. analyse the ports’ status. - run udp scan where it sending a udp packet to every destination port; it is a connectionless protocol. note: use your computer or gateway ip address in nmap commands! part b: the institute had no dedicated security team and therefore till now no security policy is in place. recently, the governing body of this business forms a security team and makes following two goals that they would like to achieve in six months - 1. assessing the current risk of the entire organization 2. treat the risk as much as possible task i: risk identification in achieving the above two goals, you will do the followings – 1. find at least five assets 2. find at least two threats against each asset 3. identify vulnerabilities for the assets task ii: risk assessment at the end of the risk identification process, you should have i) a prioritized list of assets and ii) a prioritized list of threats facing those assets and iii) vulnerabilities of assets. at this point, create threats- vulnerabilities-assets (tva) worksheet. also, calculate the risk rating of each of the five triplets out of 25. task iii: risk treatment in terms of risk treatment, for each of the five identified risk, state what basic strategy you will take. justify for each decision. also, advise all possible protection mechanism and corresponding place of application
Nov 16, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here