Question
Cover page with (Unique Project Title) Project Approval Form Marking Guide sheet Introduction Objectives Survey (Give 100 words of previous/ongoing research about the topic you
Cover page with (Unique Project Title) Project Approval Form Marking Guide sheet Introduction Objectives Survey (Give 100 words of previous/ongoing research about the topic you have chosen. Include the Sources in the References page) Project Flow Diagram Implementation Result Interpretation (Tables, Statistics, Graph,.etc.) Conclusion References Appendices Resources: Kali Linux, Windows XP, Windows Server2003 No GUI based tools allowed to present unless the tools have network implementation Virtual Box/VM Ware Refer to Lectures and Labs. Refer to college library-you need to refer at least two books Technical Websites/Google Search/YouTube Videos Blackboard No internet allowed during the presentation
tool : Xerosploit
Screen capture mode
The Case Study Implementation: Telecommunication System Students are requested to discuss the current security system in a Telecom sectors and implement a solution to secure users data. Students can discuss only one of many Wired or Wireless internet telecommunication services for this case study implementation. Student must choose A Project Title in relation with the attack and the prevention strategy. (Ex. Securing User Data from Network Spoofing) Students must generate an attack on a user data in the telecom services using Linux KALI and Windows Client Virtual Environment. Students must choose one of the following types of attacks supported by the KALI Linux OS for experiments. **No Internet allowed for presenting the project, Non-working or without implementation, projects will be disqualified.
An introductory task of the project will include the general definitions of telecommunication services and in the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. It discusses the importance of User data and the services provided by the telecommunication operator. The types of services are used by the users and their limitations as well. Our team identified the possible attacks on the available services by network spoofing. In addition, the theoretical part will also allow us to understand the basic concepts like data Privacy, Availability, Integrity, Confidentiality, Non Repudiation, Vulnerability, Threats, Exploitations, and Risks. We decided to secure the data from Network spoofing and experiment the same using KALI and Windows client virtual environment. At the end of the experiment we prove that the Network spoofing is used for falsifying user data and gain access to it with examples. The practical and report parts are summarized in the following tabular form and the allocated tasks for each member of a group.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started