Task DescriptionIn assignment 1, you have successfully implemented the network on eNSP and performed important steps to secure the network. Now they have called you to assist them with their updated...

Task DescriptionIn assignment 1, you have successfully implemented the network on eNSP and performed important steps to secure the network. Now they have called you to assist them with their updated network after a security breach. They believe that the break-in occurred through either: a) one of their servers; b) through sniffing data in transport from the remote network to the main network; c) the WiFi one of the employees decided to bring and connect.The intruder got a lot of data including confidential files and a copy of usernames and password from the servers so they would like you to assist them upgrade their security more.CSC72005 – Securing Networks Assignment-3, 20202You will need to complete the following tasks • Task 1: Consider the network and devise strategies that will secure the following:a. the remote office’s connection to the main office as it is not using any encryption;b. remote access to the servers so passwords are not sent over the wire;c. encrypted WiFi for employees.You must provide at least 2 (two) options for each. • Task 2: To ensure that this doesn’t occur again and assist with analysis you must advise why a monitoring service would benefit them and provide a suggestion as to what the service will monitor. • Task 3: Conduct a vulnerability analysis on the servers using OpenVAS. Each person must conduct one analysis, one server per person. Servers are in the VM’s folder at the CSC72005 Google share.With your colleague you will need to share the results of your audit and compareCSC72005 – Securing Networks Assignment-3, 20203them before producing the report.Assignment-2 marking guidelinesThe following are the major assessment criteria of this assignment Task 1: Network Encryption • Select a suitable network encryption architecture for each problem and justify the selection • Advise how each option provides an improvement to the security • Provide a conclusion as to which option would be best Task 2: Network monitoring • Correctly identify the devices to be monitored • Advise why you think the devices should be monitored • Advise which system you propose to monitor with. Task 3: Network vulnerability scanning • Provide a brief overview of the history of OpenVAS and its commercial cousin. • Provide a copy of the OpenVAS report (screenshot or PDF) with the top 5 results. • Determine the possible server that had the breach and what you believe was the attack vector.(Check the OpenVAS lab)Format and Presentation Final ReportEach student will need to provide a final report to the organisation which must also contain your colleague’s information and provide your own conclusions.Task 1: You are required to record a short video clip (10 min max) to explain your task 1. In the video, you will: • Provide your details e.g. your name, student id, year and the unit you are studying • Provide a short description of your options • Provide your final conclusion of which option you would choose and why.Finally, publish your video on YouTube. Use the unlisted option if you do not want the video to be viewed in public. Copy the link to your video and paste it under the task-1 section of the document template provided with this assignmentYou will also need to provide a written version of the same information.CSC72005 – Securing Networks Assignment-3, 20204Task 2 and Task 3: You must provide a report to the client.Use the template provided with this assignment for this task.Submission FormatWhen you have completed the assignment, you are required to submit your assignment in the PDF/DOC format. The file will be named using the following convention:filename = FirstInitialYourLastName_CSC72005_A3.pdf (i.e. FJones_CSC72005_A3.pdf)Original workIt is a University requirement that a student’s work complies with the Academic Policy, Chapter 4.20 on Student Academic Integrity. It is a student’s responsibility to be familiar with the Policy.Failure to comply with the Policy can have severe consequences in the form of University sanctions. For information on this Policy please refer to Chapter 4.20 on Student Academic Integrity at the following website:http://www.scu.edu.au/governance/academicboard/policy/As part of a University initiative to support the development of academic integrity, assessments may be checked for plagiarism, including through an electronic system, either internally or by a plagiarism checking service, and be held for future checking and matching purposes.Retain duplicate copyBefore submitting the assignment, you are advised to retain electronic copies of original work. In the event of any uncertainty regarding the submission of assessment items, you may be requested to reproduce a final copy.School
May 06, 2021CSC72005
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here