Computer Networks and Security Security Fundamentals2019/20 SEC4102 Assignment- ASSIGNMENT TITLE SECURITY ANALYSIS PRACTICAL PARAMETERS Hand in date for this assignment is 18 th May 2020 closing...


Computer Networks and Security


Security Fundamentals2019/20


SEC4102



Assignment-











ASSIGNMENT TITLE



SECURITY ANALYSIS PRACTICAL















PARAMETERS




Hand in date for this assignment is 18th
May 2020 closing at 16.00hrs.




Release date:03/02/2020.


Work submitted must be your own unless the appropriate references are quoted within the text. Particular attention is drawn to the unfair means regulations which you have access to. For example, it is not permitted to have just a bibliography of references; if you use someone else’s material provide a citation in the text for all references used.


Students who fail to submit assessments by the specified date (without an extension being granted or without accepted Mitigating Circumstances) will be subject to the following penalties: See Faculty Handbook for details:



https://www.bolton.ac.uk/about/governance/policies/student-policies/



Please note that it is your responsibility to ensure that the assignment is submitted in the format/s specified in the Module Guide or on the Assessment Brief. Submit your assignment work via the
Moodle Turnitin
system.




YOU SHOULD ALWAYS ENSURE YOU KEEP A COPY OF ANY ASSIGNMENT SUBMITTED BY WHATEVER METHOD





In the case of exceptional and unforeseen circumstances, an extension of up to 5 days after the assessment submission deadline may be granted by your Programme Leader.


Requests for extensions for periods longer than 5 days must be made using the Mitigating Circumstances procedures. Please see your Programme Handbook for further details.
















DELIVERABLES



This part of the practice involves the writing up and processing of results obtained in Laboratory Sessions done in the course.



Create your security case study by choosing a specific domain/s to do your penetration testing and risk assessments and countermeasures.



Make sure to take permission before starting the assignment.



Passive security artefacts, accepted, in the case of facing any difficulties obtaining the permissions.



Section A)


1) Explain in detail the difference between active reconnaissance and passive reconnaissance? Select a specific domain and perform the web search, google hacking, nslookup, Traceroute, Ping, Whois, Discover, Dig, FIERCE and maltego.


Critically analyse the result and draw a clear picture of the targets (to secure/hack)


Provide evidence of the reconnaissance work by providing screenshots /scripts.



Section B)


1) Scanning is a set of procedures for identifying live hosts, ports, and services, discovering the Operating system and architecture of the target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organisation.


Scanning refers to collecting more information using sophisticated and aggressive reconnaissance techniques


A. Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from Kali Linux to scan Metasploit Virtual machine,


B. Critically analyse the results show the open ports the services running on different ports and highlight on the advance features in nmap.


C. Perform another sweep scanning on a specific network using the zenmap. Draw The network Topology.


D. Support your report and analysis with screenshots, explain the policy and procedures the organisation should implement to reduce the impact of internal and external scanning.





2) Install and configure Nessus scanner on any platform to complete the vulnerability scanning on a single computer and then do it for the network.


Critically analyse the result, by selecting three vulnerabilities, try to find suitable countermeasures to protect the system.


Create a security document related to a different vulnerability discovered in your network, highlight your plan for mitigations, including cost/benefit analysis.





Section C)



1-

Evaluate UFW, set the rules to drop ICMP, SMTP and FTP.


2- Critically differentiate between IDS and IPS.


Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules to alert about any tcp connection from any external source to our ssh port.


Support your work with codes and screenshots.



Section D)


1- Critically compare between the MSF and Armitage? Support your answer with examples.


2- Give an example of using MSF to exploit a vulnerability in a remote system support your case with screenshots, try to show your ability in solving different technical issues.



Module Learning Outcomes

































1-



Test the effectiveness of security policies and procedures.




Yes



2-



Discuss knowledge of security concepts, data security, techniques and tools.




Yes



3-



Investigate and describe contemporary security issues.




Yes



4-



Produce security policy documentation based on best practice and to a professional standard



Yes










Breakdown of marks


a) 15%


b) 35%


c) 25%


d) 25%


The wight of this work =100% of the total marks assigned to this module.



Learning Resources



Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.


Casey, E., 2011. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.


Kanellis, P. ed., 2006. Digital crime and forensic science in cyberspace. IGI Global.


Stallings, W., Brown, L., Bauer, M.D. and Bhattacharjee, A.K., 2012. Computer security: principles and practice (pp. 978-0). Upper Saddle River (NJ: Pearson Education.


Marty, R., 2009. Applied security visualisation (p. 552). Upper Saddle River: Addison-Wesley.


Maurushat, A., 2019. Ethical Hacking.


Nguyen, T.N., 2019, January. Certified ethical hacker v. 10 online course: a case study. In Proceedings of the 10th International Conference on E-Education, E-Business, E-Management and E-Learning (pp. 168-173). ACM



Mar 10, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here