Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PROJECT OVERVIEW For the Computer and Network Security ( IAS 2 2 5 3 ) course, a large portion ( 4 0 % ) of

PROJECT OVERVIEW For the Computer and Network Security (IAS2253) course, a large portion (40%) of your grade consists of a final project-based examination. The purpose of this project is to enable students to achieve these three main course learning outcomes (CLO): 1. At the end of the course the student will be able to defining the concept of computer operation, network security and crime protection. 2. At the end of the course the student will be able to identifying the concept of cryptography, access control and firewall protection. 3. At the end of the course the student will be able to identifying the concept computer security incident, response and recovery. PROJECT REQUIREMENTS In this project, you will conduct a comprehensive vulnerability assessment of a specified network. This involves identifying, analyzing, and documenting potential security weaknesses in the network infrastructure. The goal is to understand the current security posture of the network and provide recommendations to mitigate identified vulnerabilities. This practical experience will enhance your understanding of network security principles, tools, and techniques, preparing you for real-world cybersecurity challenges. PROJECT SCENARIO 1. Scope Definition: Define the scope of the network to be assessed, including IP ranges, subnets, and specific devices. Obtain necessary permissions for conducting the assessment on the chosen network. FCVAC/IAS2253/APR24 CONFIDENTIAL/32. Information Gathering: Conduct a thorough reconnaissance to gather information about the network. Utilize tools such as Nmap, Netcat, and Wireshark to identify active hosts and open ports. 3. Vulnerability Scanning: Perform automated vulnerability scans using tools like Nessus, OpenVAS, or Qualys. Identify potential vulnerabilities related to outdated software, misconfigurations, or known exploits. 4. Manual Analysis: Conduct manual testing to validate the findings from the automated scans. Investigate false positives and identify additional vulnerabilities through manual methods. 5. Risk Assessment: Assess the potential impact and likelihood of each identified vulnerability. Prioritize vulnerabilities based on their risk level. 6. Mitigation Strategies: Provide detailed recommendations for mitigating each identified vulnerability. Include both short-term and long-term remediation strategies. PROJECT DELIVERABLES Reports: You should prepare a proposal minimum of 5 pages- the maximum length of 10 pages The format as follows: 1. Front page top, UNISEL logo, and under UNISEL logo put the title Network Vulnerability Assessment for (optional organization). Font -16-point, Bold, Times New Roman 2. Content header (next page)-14-point, Bold, Times New Roman 3. Content Font -12-point Times New Roman font, single space and justified text between margins). The proposal should contain four important parts: 1. Introduction: Overview of the network and assessment objectives. 2. Methodology: Detailed description of the tools and techniques used. FCVAC/IAS2253/APR24 CONFIDENTIAL/43. Findings: Comprehensive list of identified vulnerabilities with detailed descriptions. 4. Risk Assessment: Evaluation of the risk associated with each vulnerability. 5. Mitigation Strategies: Recommendations for addressing each vulnerability. 6. Conclusion: Summary of the assessment and overall security posture of the network. SUMMARY OF EVALUATION MARKS: Here is the summary of the project deliverable evaluation marks section: CLO Deliverables Marks 1 At the end of the course the student will be able to defining the concept of computer operation, network security and crime protection. (C5,PLO1)302 At the end of the course the student will be able to identifying the concept of cryptography, access control and firewall protection. (C5,PLO2)303 At the end of the course the student will be able to identifying the concept computer security incident, response and recovery (C5,PLO3)40 Total 100 PROJECT SUBMISSION Date Day Time Deliverable 9 July 2024 Wed 8am 10pm Proposal submission END OF QUESTION PAPE

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Microsoft SQL Server 2012 Administration

Authors: Adam Jorgensen, Steven Wort

1st Edition

1118106881, 9781118106884

More Books

Students also viewed these Databases questions

Question

=+b) What were the treatments?

Answered: 1 week ago