Summative Assessment Group or Individual Project: 250 pts. Directions on Project: Your instructor will provide information about project topics, the scope of work, and submission requirements. Review...

1 answer below »
ITS IN THE DOCUMENTNeed you to also do a power point as well


Summative Assessment Group or Individual Project: 250 pts. Directions on Project: Your instructor will provide information about project topics, the scope of work, and submission requirements. Review scoring rubric for the project to aid in the construction and organization of the project. Listed below are potential guidelines for you to follow: Guidelines on Your Cybersecurity Bachelor Project Following are the guidelines for a graduate project. Apart from these guidelines, your instructor may also suggest guidelines and instructions as required during the course of the graduate project. Selecting a Topic · Choose a project on a topic of your interest related to your subject of study. The idea for a project may come from your own curiosity, from your coursework, interactions with colleagues, faculty members, and general observation. The group project will decided between your colleagues and approved by your instructor. The project should include a working demo and technical documentation. · Explore the idea; examine its significance and feasibility. Go through the existing projects on similar topics. Conduct a preliminary research on the idea. Review the relevant literature. Examine the gap areas in research and identify issues you want to address. The idea should be new or must add significant value to the existing projects. · Prepare a rough outline of project proposal you would like to submit. · Conduct further research on the topic. Make a detailed proposal. In the project proposal, you should: a. Introduce the topic b. Explain your rationale for selecting the project c. Describe the significance of the project d. State the objective of the project and project outline e. Describe the methodology to be adopted f. State the timeline for the project completion g. Include references · Finalize the proposal with your instructor by week 10. Post your proposal to the discussion board related to the project here:Your Cybersecurity Team Project Working on the Project · On approval of the project, you should start working on your project. It is recommended you do this prior to the 11th week of the course but speak with your instructor to clarify dates. Limit your research to the approved proposal. · Make sure your instructor approves questionnaires designed for any survey in relation to the project. · You must use any data collected in course of the research, only for the approved project. You must not share collected information with other candidates. · Make notes of key points during the course of research. It would save a lot of time in preparation of project report. · Make sure all relevant journals, magazines, papers, and books are available in the college library. Please check with the library information desk for information on resources, currently not available with the library. · The analysis is the most critical part of the project and forms basis for all findings. Writing a Project Report · Review the style guidelines for project report · Select A4 size; page orientation should be portrait. Specify “1” margin on all sides. · Number all pages consecutively. Start every chapter on a new page. · Provide double spacing · You should use Times New Roman Font- “12” for text and “10” for footnotes. Use a larger font size for section headings. · Optional Report template: ISM 3321 Research Paper Template.docx · Actions · · A Project guideline may contain: Content Section a. Title Page Preliminaries b. Table of Contents c. Abstract(Optional) d. Introduction and background Body of the report e. Problem statement f. Objectives of the project g. Technical walk through including screenshots h. Methodology adopted (optional) i. Results - project findings j. Recommendations k. Conclusion l. Bibliography References m. Appendix (Optional) n. List of figures and tables(optional) o. Index words (optional) · Be clear and precise. Express your ideas in a logical way. · If using an abstract it should reflect the essence of the project · The introduction should provide the overview of the topic and highlight its significance · Clearly, indicate the objectives of your project. · If using several types of methods, describe all the methods used such as interviews, questionnaires in the methodology section. Optional. · Ensure that literature review is in your own words. Analyze other person’s contribution to the topic. Identify the gaps in the literature. Emphasize on the likely contribution of your project to the existing literature on the topic. · Describe your findings from the analysis in the results section. As this is the most critical part of the project, ensure that there are no errors in analysis. Make proper inferences from analysis and findings. · The conclusion section should summarize your objectives, findings, and learning’s from the project. Provide useful supplementary information in the Appendix. · Avoid plagiarism. The project report should reflect your understanding of the topic. The majority of the paper should be in your own words and reflect your own ideas. · Give credit for all referenced work. Provide appropriate citation and references for all quotations. · Ensure that papers referenced are relevant and not outdated. · Your paper should be reader friendly. Use footnotes to explain difficult terms. · Don’t use text from Wikipedia in footnotes · All tables and figures must be suitably numbered and titled. Give appropriate credit. · On completion, go through the entire project. Ensure there are no proofing errors and you have adhered to all guidelines related to the project. Note: The final step to submit your assignment is to accept the "Submission Statement". You need to click the "Submit Assignment" button on the right side of the page. Then select the checkbox and continue button. Each member of the group should submit the final version of their project in pdf form. Rubric Research Paper (60) Research Paper (60) Criteria Ratings Pts This criterion is linked to a Learning OutcomeIntroduction 6 pts Exceeds Standards Strong introduction of topics key question(s), terms, Clearly delineates subtopics to be reviewed. Specific thesis statement 3 pts Meets Standards Conveys topic and key question(s). Clearly delineates subtopics to be reviewed. General thesis statement 2 pts Needs Some Improvement to Meet Standards Coveys topic, but not key question(s). Describes subtopics to be reviewed. General thesis statement. 1 pts Needs Substantial Improvement to Meet Standards Does not adequately convey topic. Does not describe subtopics to be reviewed. Lacks adequate theses statement. 6 pts This criterion is linked to a Learning OutcomeFocus and Sequencing 18 pts Exceeds Standards All material clearly related to subtopic, main topic. Strong organization and integration of material within subtopics. Strong transitions linking subtopics, and main topic. 9 pts Meets Standards All material clearly related to subtopic, main topic and logically organized within subtopics. Clear, varied transitions linking subtopics, and main topic. 5 pts Needs Some Improvement to Meet Standards Most material clearly related to subtopic, main topic. Material may not be organized within subtopics. Attempts to provide variety of transitions. 1 pts Needs Substantial Improvement to Meet Standards Little evidence material is logically organized into topic, subtopics or related to topic. Many transitions are unclear or unsubstantiated. 18 pts This criterion is linked to a Learning OutcomeSupport, Citations, and References 18 pts Exceeds Standards Strong peer-reviewed research based support for thesis, references and citations are thoroughly and clearly indicated after every quote or an authors statement or idea. 9 pts Meets Standards Good research based support for thesis, references and citations are adequately and clearly indicated after most quotes or an authors statement or idea. 5 pts Needs Some Improvement to Meet Standards Some research based support for thesis, references and citations are inconsistently indicated after a few quotes or an authors statement or idea. 1 pts Needs Substantial Improvement to Meet Standards limited or no peer-reviewed research based support for thesis, references and citations are absent. 18 pts This criterion is linked to a Learning OutcomeSpelling and Grammar 6 pts Exceeds Standards Work has no misspellings or grammatical errors. 3 pts Meets Standards Work has 1 or 2 misspellings or grammatical errors 2 pts Needs Some Improvement to Meet Standards Work has several misspellings or grammatical errors 1 pts Needs Substantial Improvement to Meet Standards Work has numerous misspellings or grammatical errors 6 pts This criterion is linked to a Learning OutcomeConclusion 6 pts Exceeds Standards Strong review of key conclusions and integration with thesis statement. Insightful and supported discussion of impact of the researched material. 3 pts Meets Standards Good review of key conclusions and integration with thesis statement. Good discussion on impact of researched material. 2 pts Needs Some Improvement to Meet Standards Review of key conclusions. Some integration with thesis statement. Discusses impact of researched material on topic. 1 pts Needs Substantial Improvement to Meet Standards Does not summarize evidence with response to thesis statements. Does not discuss the impact of researched material. 6 pts This criterion is linked to a Learning OutcomeCitations and References 6 pts Exceeds Standards All references and citations are correctly written and present. 3 pts Meets Standards One reference or citations missing or incorrectly written. 2 pts Needs Some Improvement to Meet Standards Two references or citations missing or incorrectly written. 1 pts Needs Substantial Improvement to Meet Standards Reference and citation errors detract significantly from paper. 6 pts This criterion is linked to a Learning Outcome1. Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements. Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements. threshold: 3.0 pts 5 pts Exceeds Expectations 3 pts Meets Expectations 0 pts Does Not Meet Expectations -- This criterion is linked to a Learning Outcome2. Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system. Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system. threshold: 3.0 pts 5 pts Exceeds Expectations 3 pts Meets Expectations 0 pts Does Not Meet Expectations -- This criterion is linked to a Learning Outcome3. Compare and contrast different hacking techniques and analyze the legal implications of hacking. Compare and contrast different hacking techniques and analyze the legal implications of hacking. threshold: 3.0 pts 5 pts Exceeds Expectations 3 pts Meets Expectations 0 pts Does Not Meet Expectations -- This criterion is linked to a Learning Outcome4. Examine different vulnerabilities, threats and attacks to information systems and recommend the countermeasures. Examine different vulnerabilities, threats and attacks to information systems and recommend the countermeasures. threshold: 3.0 pts 5 pts Exceeds Expectations 3 pts Meets Expectations 0 pts Does Not Meet Expectations -- This criterion is linked to a Learning Outcome5. Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information Analyze cryptography algorithms
Answered 8 days AfterApr 25, 2022

Answer To: Summative Assessment Group or Individual Project: 250 pts. Directions on Project: Your instructor...

Naveen Kumar answered on Apr 28 2022
114 Votes
EXPLOIT SMB Remote Windows Kernel Pool CorruptionMS17-010
ISM 3321 Research Paper
Running head: EXPLOIT THE Windows SYStem smbv1    1
13
EXPLOIT SMB REMOTE WINDOWS KERNEL POOL
ISM 3321 Research Paper
Nicole Dyess
Eastern Florida State College
Spring 2021 ISM 3321 Cybersecurity Fundamentals
Table of Contents
Abstract---------------------------------------------------------------------------------------
---------------- 2
Introduction -------------------------------------------------------------------------------------------------- 3
Problem Statement------------------------------------------------------------------------------------------- 3
Objectives of project----------------------------------------------------------------------------------------- 4
Technical walkthrough-------------------------------------------------------------------------------------- 4
Results-------------------------------------------------------------------------------------------------------- 12
Recommendations------------------------------------------------------------------------------------------- 13
Conclusions-------------------------------------------------------------------------------------------------- 13
Abstract
Internet is changed everything, it has brought a revolution in way of communication and sharing the information compared to legacy ways. Now a day’s majority of the confidential and common information had been exchanging through the internet in a secure way. But based on the sum of weak spots or vulnerabilities on the windows hackers successfully exploiting and compromising the information. SMB also known as a Server Message Block, is a file sharing protocol that allows windows systems connected or communicating to the same network or domain to share files. SMB also give an access to network devices to share resources like printers and serial ports from other devices in the same subnet.
Introduction
SMB is the protocol, used for sharing the file and information in between the devices connected in a network. They are multiple versions of SMB is in the productions, in this assignment I’m going to exploit SMBv1 vulnerability.
Vulnerability in SMBv1:
· SMB v1 vulnerability could allow a remote attacker to take control of an affected device.
· Microsoft already been released a patch to point the SMB v1 vulnerability.
Still most of the users are using legacy windows 7 operating system with services pack 1, this is most effected pack with EternalBlue exploits the SMB vulnerability.
Problem Statement
Communication methods with the help of Internet:
The Internet has become embedded in every aspect of our day to day live, changing the way we interact with others and sharing the file or information. Attackers are taking the advantages of this opportunities.
Objectives
I’m going to demonstrate the windows exploit, MS17-010 known as Eternal Blue.
EternalBlue is the given name to a series of microsoft software vulnerabilities and the exploit created by the Nation security agencies as a cyberattack tool.
For this exploit what are the tools, scripts and technologies all are legitimate and legal.
Technical Walk-Through
Exploiting the windows operating system running with SMB v1.
Items used:
Exploited Tools:
Metasploit Framework v6.
NMAP Scanner.
Operating Systems:
Linux- Kali.
Microsoft Windows 7.
Microsoft Windows Server.
Applications:
Command promote.
Microsoft Edge.
Architectures:
X64
Exploit Methods:
Searching for open ports and vulnerabilities:
I’m starting with an NMAP deep scan while running the vulnerability script which tries to find common vulnerabilities of the services running on the windows server’s or ports.
Note: Please refer the attached NMAP_Scan_result file for more information.
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers
Initiating SYN Stealth Scan at 04:30
Scanning 10.0.0.11 [1001 ports]
Discovered open port 135/tcp on 10.0.0.11
Discovered open port 139/tcp on 10.0.0.11
Discovered open port 445/tcp on...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here