Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Purpose of the assessment

a) Discuss common threats and attacks on networked information systems

b) Identify most common intrusion detection attacks, and discuss how to prevent them

c) Apply skills to analyse complex problems in network security under supervision

Assignment Description

For this assignment you will evaluate one of the Network Security tools from Table 1. Marks will be awarded based on the sophistication and the difficulties the demonstration explored.

Your task is to complete and make a 4-5 min video presentation on the following:

1. Download and install (on your computer or on MIT Virtual box) one of the Security Tool from Table 1.

2. Demonstrate (narration of your actions recorded by video) 4 tasks the software can perform.

3. Outline of your presentation.

4. Usability of the tool.

5. Present the results in a video presentation.

6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the Security Tool.

Length of Video: Introduction (30 secs approximately, your appearance should be in the video) + Outline of the presentation (30 secs approximately) + Demonstration of the task (210 seconds approximately) + Usability of the Tool (15 seconds approximately) + Conclusion (15 secs approximately, with appearance)

Table 1 Network Security Tool

Serial #

Software

Description

1

Snort

Snort is an open source intrusion prevention system for windows and unix. The software enables users to monitor real time traffic and carry out packet logging.

 

2

Kismet Wireless

Kismet is an 802.11 wireless network detector. Kismet could be used to log traffic and plot detected networks.

3

Open SSH

Open SSH is an open source security tool, which could be used for remote login to the SSH protocol. Open SSH also enables the user to perform secure tunneling.

4

Nessus

Nessus is a licensed software for vulnerability scanning, however a free trial version is available. Nessus could be used to scan for viruses, malware, backdoors, and hosts communicating with botnet-infected systems.

5

Security Onion

Security Onion is based on Ubuntu. Security Onion provides solutions for intrusion detection, network security monitoring and log management.

You may use any of the available open source software for screen capture.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92426729
  • Price:- $15

Priced at Now at $15, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Autonomous consumptionnbsp 660marginal propensity to

Autonomous consumption  = 660 Marginal propensity to consume  = 0.8 Autonomous taxation  = 200 Income tax rate =  0.2 Planned investment  = 500 Government spending  = 500 Autonomous net exports  = 300 NX  = 0.04 Calculat ...

Recent tariff actions by president trump include raising

Recent tariff actions by President Trump include raising tariffs and quotas on imports of both manufactured goods like televisions and automobiles and intermediate goods like steel and aluminum sheets. How will the econo ...

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

1srin response to nmap -n -sn localhost what kind of

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically? 2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan 3. SR How does the "-sn" ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As