Assignment Description
Network security is a process to secure the computer network system from all sorts of security threats, including threats to the physical set up. In this assignment, your task is to identify and evaluate network security threats that relate to network monitoring. You may, for example, investigate the network in the Institute, at your home or of the Internet by using any network security tool.
Use any TWO open source network monitoring and analysis tool mentioned below:
GFI LanGuard PRTG
Nmap
Metasploit
TCPdump
Open VAS
After scanning the network, compare and discus results on the threats these tools could be used for network monitoring and analysis. Also provide appropriate mitigation and countermeasure strategies for the identified threats and vulnerabilities.
Submission Guidelines
Your report should include and discuss all the results in detail with appropriate screenshots. Report should investigate and show originality of work, and be different from others.
Marking criteria:
Section to be included in the report
|
Description of the section
|
Marks
|
Introduction
|
Appropriately select a tool and discuss how it detects and exploit network vulnerabilities
|
3
|
Literature Review
|
Related to your topic, discuss major methodologies related to network security threats and attacks
|
10
|
Network Security Tools
|
Discuss how you identify and analyse network security threats. Provide detailed description of all threats with appropriate screenshots.
|
20
|
Threat Mitigation Techniques
|
Discuss in detail mitigation techniques for the selected vulnerabilities in your report
|
10
|
Conclusion
|
Summarize your findings in report with valid comments
|
2
|
Reference style
|
Appropriate IEEE referencing style and report presentation
|
5
|
|
Total
|
50
|
Prepared by: Mr. Naveed Dilber Moderated by: Dr. Javed Baloch, July, 2018
BN203 Assignment 2 Page 3 of 3 Marking Rubric: Total Marks 50
Grade Mark
|
HD 40-50
|
DI 35-39
|
CR 30-34
|
P 25-29
|
Fail
|
|
Excellent
|
Very Good
|
Good
|
Satisfactory
|
Unsatisfactory
|
Introduction /3
|
All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated
|
Topics are relevant and soundly analysed.
|
Generally relevant and analysed.
|
Some relevance and briefly presented.
|
This is not relevant to the assignment topic.
|
Literature Review /10
|
Finding is clearly linked and well justified
|
Finding is clearly linked and justified
|
Finding is linked and convincing
|
Finding is not linked and unjustified
|
Finding is not available
|
Network Security Tools /20
|
Exceptional discussion on security threats for the system with appropriate tools. Identifying highly sophisticated and well referenced vulnerabilities
|
Exceptional discussion on security threat for the system with appropriate tools however results not explained in detail.
|
Discussion on security threat are generic and covered some aspect of assessment with relevant tools
|
Discussion on Two security threats using tools are generic and lack detail
|
Unable to clearly explain security threat using tools
|
Threat Mitigation Techniques /10
|
Advance discussion on threats mitigation using latest technologies and procedures
|
Good discussion on threats mitigation using technologies and procedures
|
Good discussion on threats and mitigation
|
Discussion on threats and mitigation but it needs to be improved.
|
Lacking discussion on threats and mitigation
|
Conclusion /2
|
A very powerful conclusion with full confidence.
|
Very Good Conclusion
|
Appearance made and good conclusion provided
|
Appearance made and conclusion provided.
|
Barely appear at the end of the video.
|
Reference style /5
|
Clear styles with excellent source of references.
|
Clear referencing style
|
|
|
|