Part 2 Your individual project for this Unit requires you to respond to executive management as the same independent cyber security team lead now attempting to meet the requirements of your second...

1 answer below »
all 4 parts need to be done


Part 2 Your individual project for this Unit requires you to respond to executive management as the same independent cyber security team lead now attempting to meet the requirements of your second task on the awarded CB-Technologies security contract. Scenario: CB-Technologies management, the Chief Technology Officer and the local security team has been confused about how to identify several different types of network-based attacks. The current contract requires the delivery of a 3-4-page Tech Memo (Technical Paper) in MS-Word comparing four forms of network-based attacks: web shell, VOIP, IP Spoofing, and DNS spoofing. Explain the improvements in security features from IPv4 to IPv6. Note: The cover and citation pages do not count toward the 3–4-page requirement. Part3 Your project for this Unit requires you to work on a collaborative team to present recommended countermeasures for network hardware and software design vulnerabilities. Note: It is required that all communication between group members occur in the Group Project Discussion Board. Your instructor will monitor this area. Professionalism is expected. Develop a 12-15 slide PowerPoint presentation to describe the hardware, software, and design vulnerabilities unique to a local area network and recommend countermeasures for each vulnerability. Assign the following group assignment requirements to your members to be completed: 1. Group Member #1: a. Title Slide b. Topics of Discussion Slide (Introduces main points of overall presentation) c. Technical Slide(s) presenting the hardware security issues on at least two of the following areas: 1) Side Channel attacks; 2) Man in the Middle attacks; 3) Differential Power Analysis attacks; 4) Memory related attacks. 2. Group Member #2: a. Technical Slides presenting the software vulnerability issues on at least two of the following areas: 1) Buffer Overflow attacks; 2) Unprotected API attacks; 3) 3rd Party Library attacks; 4) SQL injection attacks. 3. Group Member #3: a. Technical Slides presenting the research behind design vulnerability "logic flaws" and how threat leverage the logic flaws in systems to imitate real network users. 4. Group Member #4: a. Technical Slide providing an overview of at least 4 (2 software, 2 hardware) of the following countermeasures organizations take to combat hardware and software design vulnerabilities: i. Hardware: 1) Side Channel attacks; 2) Man in the Middle attacks; 3) Differential Power Analysis attacks; 4) Memory related attacks ii. Software: 1) Buffer Overflow attacks; 2) Unprotected API attacks; 3) 3rd Party Library attacks; 4) SQL injection attacks 5. Group Member #5: a. Conclusion Slide(s) summarizing all technical points made in the presentation and any final observations b. APA reference slide consolidating all references used Part4 For this assignment we continue to meet our CB-Technologies obligation to the customer in our fourth contract delivery. In this fourth item delivery your team will need to prepare a training presentation (10-14 slides) listing the hardware, software, and design features of a Wide Area Network. In your presentation, describe the vulnerabilities to each feature and recommend countermeasures that provide for confidentiality, integrity, and availability of the WAN and prevent the vulnerability from being exploited. The following presentation structure is recommended in the contract data item description: 1. Title slide (1 slide) 2. Topics of Discussion slide (highlighted training points in the presentation) (1 slide) 3. WAN hardware, software, and design features (3-5 slides) 4. Recommended WAN countermeasures (3-5 slides) 5. Conclusion slide (1 slide) 6.  Reference slide (details references in APA format) (1 slide) . Part5 Your individual project for this unit has you preparing a 13-16 slide presentation on 3 network security careers and list common certifications pursued by professionals working in those careers. There are certifications supporting specific vendor products and some generic to the industry so this will also be required content in the presentation. Follow the technical and format guidelines below when completing your presentation: 1. Title slide (1 slide) 2. Topics of Discussion slide (highlighted career and certification points in the presentation) (1 slide) 3. Description of 3 careers are available to someone interested in working in the field of network security (3-4 slides) 4. Common professional certifications pursued by network security professionals (3-4 slides) 5. Identify and describe certifications designed to support a specific vendor product, and those which are generic to the industry (3-4 slides) 6. Conclusion slide (1 slide) 7. Reference slide (details references in APA format) (1 slide)
Answered 3 days AfterMar 08, 2022

Answer To: Part 2 Your individual project for this Unit requires you to respond to executive management as the...

Nithin answered on Mar 12 2022
115 Votes
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here