Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Cover page with (Unique Project Title) Project Approval Form Marking Guide sheet Introduction Objectives Survey (Give 100 words of previous/ongoing research about the topic you

Cover page with (Unique Project Title) Project Approval Form Marking Guide sheet Introduction Objectives Survey (Give 100 words of previous/ongoing research about the topic you have chosen. Include the Sources in the References page) Project Flow Diagram Implementation Result Interpretation (Tables, Statistics, Graph,.etc.) Conclusion References Appendices Resources: Kali Linux, Windows XP, Windows Server2003 No GUI based tools allowed to present unless the tools have network implementation Virtual Box/VM Ware Refer to Lectures and Labs. Refer to college library-you need to refer at least two books Technical Websites/Google Search/YouTube Videos Blackboard No internet allowed during the presentation

tool : Xerosploit

Screen capture mode

The Case Study Implementation: Telecommunication System Students are requested to discuss the current security system in a Telecom sectors and implement a solution to secure users data. Students can discuss only one of many Wired or Wireless internet telecommunication services for this case study implementation. Student must choose A Project Title in relation with the attack and the prevention strategy. (Ex. Securing User Data from Network Spoofing) Students must generate an attack on a user data in the telecom services using Linux KALI and Windows Client Virtual Environment. Students must choose one of the following types of attacks supported by the KALI Linux OS for experiments. **No Internet allowed for presenting the project, Non-working or without implementation, projects will be disqualified.

An introductory task of the project will include the general definitions of telecommunication services and in the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. It discusses the importance of User data and the services provided by the telecommunication operator. The types of services are used by the users and their limitations as well. Our team identified the possible attacks on the available services by network spoofing. In addition, the theoretical part will also allow us to understand the basic concepts like data Privacy, Availability, Integrity, Confidentiality, Non Repudiation, Vulnerability, Threats, Exploitations, and Risks. We decided to secure the data from Network spoofing and experiment the same using KALI and Windows client virtual environment. At the end of the experiment we prove that the Network spoofing is used for falsifying user data and gain access to it with examples. The practical and report parts are summarized in the following tabular form and the allocated tasks for each member of a group.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Write formal proposal requests.

Answered: 1 week ago

Question

Question What integration level should an employer choose?

Answered: 1 week ago