Assignment Description Network security is a process to secure the computer network system from all sorts of security threats, including threats to the physical set up. In this assignment, your task...

1 answer below »

Assignment Description


Network security is a process to secure the computer network system from all sorts of security threats, including threats to the physical set up. In this assignment, your task is to identify and evaluate network security threats that relate to network monitoring. You may, for example, investigate the network in the Institute, at your home or of the Internet by using any network security tool.


Use any TWO open source network monitoring and analysis tool mentioned below:


 GFI LanGuard  PRTG
 Nmap
 Metasploit
 TCPdump
 Open VAS


After scanning the network, compare and discus results on the threats these tools could be used for network monitoring and analysis. Also provide appropriate mitigation and countermeasure strategies for the identified threats and vulnerabilities.


Submission Guidelines


Your report should include and discuss all the results in detail with appropriate screenshots. Report should investigate and show originality of work, and be different from others.


Marking criteria:














































Section to be included in the report



Description of the section



Marks



Introduction



Appropriately select a tool and discuss how it detects and exploit network vulnerabilities



3



Literature Review



Related to your topic, discuss major methodologies related to network security threats and attacks



10



Network Security Tools



Discuss how you identify and analyse network security threats. Provide detailed description of all threats with appropriate screenshots.



20



Threat Mitigation Techniques



Discuss in detail mitigation techniques for the selected vulnerabilities in your report



10



Conclusion



Summarize your findings in report with valid comments



2



Reference style



Appropriate IEEE referencing style and report presentation



5




Total



50



Prepared by: Mr. Naveed Dilber Moderated by: Dr. Javed Baloch, July, 2018


BN203 Assignment 2 Page 3 of 3 Marking Rubric: Total Marks 50






































































Grade Mark



HD 40-50



DI 35-39



CR 30-34



P 25-29



Fail




Excellent



Very Good



Good



Satisfactory



Unsatisfactory



Introduction /3



All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated



Topics are relevant and soundly analysed.



Generally relevant and analysed.



Some relevance and briefly presented.



This is not relevant to the assignment topic.



Literature Review /10



Finding is clearly linked and well justified



Finding is clearly linked and justified



Finding is linked and convincing



Finding is not linked and unjustified



Finding is not available



Network Security Tools /20



Exceptional discussion on security threats for the system with appropriate tools. Identifying highly sophisticated and well referenced vulnerabilities



Exceptional discussion on security threat for the system with appropriate tools however results not explained in detail.



Discussion on security threat are generic and covered some aspect of assessment with relevant tools



Discussion on Two security threats using tools are generic and lack detail



Unable to clearly explain security threat using tools



Threat Mitigation Techniques /10



Advance discussion on threats mitigation using latest technologies and procedures



Good discussion on threats mitigation using technologies and procedures



Good discussion on threats and mitigation



Discussion on threats and mitigation but it needs to be improved.



Lacking discussion on threats and mitigation



Conclusion /2



A very powerful conclusion with full confidence.



Very Good Conclusion



Appearance made and good conclusion provided



Appearance made and conclusion provided.



Barely appear at the end of the video.



Reference style
/5



Clear styles with excellent source of references.



Clear referencing style





Answered Same DaySep 14, 2020BN203

Answer To: Assignment Description Network security is a process to secure the computer network system from all...

Amit answered on Sep 19 2020
142 Votes
Full Name :
    
    Student ID :
    
    Subject :
    
    Assignment No :
    
    Due Date :
    
    Lecturer’s Name :
    
Nmap and PRTG for finding network vulnerabilities
Your Name:
Your Email:
College name, University name, Country name
Table of Contents

1.    Introduction to Nmap and PRTG    3
2.    Literature reviews on findings    3
3.    Result analysis of network vulnerabilities with Nmap and PRTG    4
4.    Mitigation techniques of threats    10
5.    Conclusion    11
6.    References:    12
1. Introduction to Nmap and PRTG
For finding the network vulnerabilities, the network monitoring tools are playing very important and critical role in modern era. By network monitoring, the occurred vulnerabilities to network can be identified and network security can easily be improved.
The Nmap and PRTG are freeware tools available for network monitoring. The Nmap application provides a service and host discovery by creating a map of complete network. For identifying the network vulnerabilities, the specially created packets are send to all connected hosts to network by Nmap and on bases of their response, the network vulnerabilities are identified. Most of the OS are supported by Nmap. The facilities of accepting a scan during congestion and latency makes Nmap suitable to find network vulnerabilities. The Nmap includes the main features to detection of vulnerability, detection of advance services and discovery of network services and connected hosts [Shand & Tryfonas, 2008].
Like Nmap, “Paessler Route Traffic Grapher” commonly known as PRTG is another network monitoring tool to find the network vulnerabilities. The SNMP frames are being analyzed by PRTG and a graph of result is generated, so that any vulnerability to complete network traffic can be identified. The sniff facility of PRTG for identifying network vulnerabilities makes it very suitable for network monitoring.
2. Literature reviews on findings
The network security threats can occur from different methodologies deployed by any attacker or inducer. The attackers can make use of below listed methodologies for creating issues to created network:
1. Malware: It is small computer program which creates Trojan horses, malicious root kits, worms and viruses for create network. The infection from one node to other is distributed by this methodology and complete network security issues are arrived.
2. Spyware: This is another technique used to create network security issues in a spy manner. The Trojan software is used by cyber criminals to record the activities of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here