Question
Case Study: An educational institute suffers from very low information security in terms of maturity across many elements of infosec and information assurance, including cyber
Case Study: An educational institute suffers from very low information security in terms of maturity across many elements of infosec and information assurance, including cyber resilience and application of cybersecurity good practice. Students expect a high level of protection of their data, however, data breaches can put the reputation of the institute at risk. It is highly recommended that a certain level of filtering is imposed for the network to be secure so as to sustain from threats and attacks. Let us assume that you are hired by the institute to develop an information security plan to identify the possible threats to the organisation. For example, it is necessary to identify the important services (e.g., web site, Moodle, ) that the institute is running. The criteria that you need to address based on the given scenario is summarised into two parts: Part A: 1. Assessing the current risk of the entire business 2. Treat the Risk as much as possible Task I: Risk Identification In achieving the above two goals, you will do the followings Find at least five assets 1. Find at least two threats against each asset 2. Identify vulnerabilities for the assets Task II: Risk Assessment At the end of the risk identification process, you should have i) a prioritized list of assets and ii) a prioritized list of threats facing those assets and iii) Vulnerabilities of assets. At this point, create ThreatsVulnerabilities-Assets (TVA) worksheet. Also, calculate the risk rating of each of the five triplets out of 25. Part B: You are expected to implement one of the attacks that could be happening on any of the assets. For example, if one of the assets is platform used (e.g., Moodle), it has a login page, and the students have to enter their username and password. You can assume that platform is vulnerable to password cracking attacks. This assessment requires you to use password crackers to break passwords. The password cracker is a software designed to break passwords. Use two different type of password crackers (e.g., Brute force Attack, Rule Attack or Dictionary attack) to extract passwords from the Rainbow table. You are required to first set up a rainbow table and apply the password cracker on that
please provide screen shots of the work as well
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started