Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Overview of Network Security Assessment - Analysis of network security tools

Purpose of the assessment - The purpose of this assignment is to evaluate and compare two security tools. Student will discuss common threats and attacks on networked information systems, and how to mitigate them. Students should be able to demonstrate their achievements in the following unit learning outcomes: Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems;

Assignment Description - For this assignment, you will select, analyse, and compare the features of any two Network Security tools listed in Table 1 (in attached file) and evaluate their suitability for the given network scenario. Marks will be awarded based on the analysis of the characteristics, features and applicability of these security tools and also based on the quality of demonstration/presentation.

Your task is to complete and make a 6-7 min video presentation on the following:

1. Download and install (on your computer or on MIT Virtual box) any two of the Security Tools from Table 1.

2. Outline of your presentation should include the description of each tool.

3. Demonstrate (narration of your actions recorded in video) 4 tasks that each of the selected software/security tools can perform. Your demonstration should include:

i. Discussion on the threats that these tools can be used for mitigation (the name and brief description of the threats should be included in your discussion), and

ii. Explanation of how to use these tool to monitor security threats.

4. Comparison of the tools that you have selected for this work. Your comparison could include:

i. Security features (range/level)

ii. Time taken to detect any threat

iii. Ease of usage

5. Analyse the following scenario and give your opinion on which of the tools that you investigated could be more suitable for the scenario. In your analysis, please consider the following:

i. Discuss the business requirement for UVW in terms of their security?

ii. Identify the probable Security threats for UVW?

iii. Select and propose a tool (between the two tools that you have worked on) that could be used for the given scenario.

iv. Justify your selection.

6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience of using the selected Security Tools.

Case Scenario: UVW is an educational institute with three sites in Brisbane, Adelaide and Hobart. The main campus of UVW is in Brisbane. The servers are located in Brisbane. Each campus has approximately 60 staff and they have 5 departments, Academic, Finance, Operations, Student service, and Administration. Staff from all three sites need to communicate with each other on a daily basis on various matter. Although most of the staff are full time and have fixed desk but some of the staff work part-time and UVW have BYOD (Bring Your Own Device) policy for their staff where staff can bring their own device/s and connect to the institute's network through wireless connection. Students also use wireless connection on the campus to access unit material as well as remain connected with friends. UVW require highest level of security and confidentiality to protect their data and information. So, network and information security is very important for UVW. The challenge of UVW is to maintain high level of security within a small budget.

Attachment:- Assignment File.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92788385
  • Price:- $90

Guranteed 48 Hours Delivery, In Price:- $90

Have any Question?


Related Questions in Computer Network & Security

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Assignment -global finance inc gfi - global finance inc gfi

Assignment - GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specia ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As