Answered step by step
Verified Expert Solution
Question
1 Approved Answer
PROJECT OVERVIEW For the Computer and Network Security ( IAS 2 2 5 3 ) course, a large portion ( 4 0 % ) of
PROJECT OVERVIEW For the Computer and Network Security IAS course, a large portion of your grade consists of a final projectbased examination. The purpose of this project is to enable students to achieve these three main course learning outcomes CLO: At the end of the course the student will be able to defining the concept of computer operation, network security and crime protection. At the end of the course the student will be able to identifying the concept of cryptography, access control and firewall protection. At the end of the course the student will be able to identifying the concept computer security incident, response and recovery. PROJECT REQUIREMENTS In this project, you will conduct a comprehensive vulnerability assessment of a specified network. This involves identifying, analyzing, and documenting potential security weaknesses in the network infrastructure. The goal is to understand the current security posture of the network and provide recommendations to mitigate identified vulnerabilities. This practical experience will enhance your understanding of network security principles, tools, and techniques, preparing you for realworld cybersecurity challenges. PROJECT SCENARIO Scope Definition: Define the scope of the network to be assessed, including IP ranges, subnets, and specific devices. Obtain necessary permissions for conducting the assessment on the chosen network. FCVACIASAPR CONFIDENTIAL Information Gathering: Conduct a thorough reconnaissance to gather information about the network. Utilize tools such as Nmap, Netcat, and Wireshark to identify active hosts and open ports. Vulnerability Scanning: Perform automated vulnerability scans using tools like Nessus, OpenVAS, or Qualys. Identify potential vulnerabilities related to outdated software, misconfigurations, or known exploits. Manual Analysis: Conduct manual testing to validate the findings from the automated scans. Investigate false positives and identify additional vulnerabilities through manual methods. Risk Assessment: Assess the potential impact and likelihood of each identified vulnerability. Prioritize vulnerabilities based on their risk level. Mitigation Strategies: Provide detailed recommendations for mitigating each identified vulnerability. Include both shortterm and longterm remediation strategies. PROJECT DELIVERABLES Reports: You should prepare a proposal minimum of pages the maximum length of pages The format as follows: Front page top, UNISEL logo and under UNISEL logo put the title Network Vulnerability Assessment for optional organization Font point, Bold, Times New Roman Content header next pagepoint, Bold, Times New Roman Content Font point Times New Roman font, single space and justified text between margins The proposal should contain four important parts: Introduction: Overview of the network and assessment objectives. Methodology: Detailed description of the tools and techniques used. FCVACIASAPR CONFIDENTIAL Findings: Comprehensive list of identified vulnerabilities with detailed descriptions. Risk Assessment: Evaluation of the risk associated with each vulnerability. Mitigation Strategies: Recommendations for addressing each vulnerability. Conclusion: Summary of the assessment and overall security posture of the network. SUMMARY OF EVALUATION MARKS: Here is the summary of the project deliverable evaluation marks section: CLO Deliverables Marks At the end of the course the student will be able to defining the concept of computer operation, network security and crime protection. CPLO At the end of the course the student will be able to identifying the concept of cryptography, access control and firewall protection. CPLO At the end of the course the student will be able to identifying the concept computer security incident, response and recovery CPLO Total PROJECT SUBMISSION Date Day Time Deliverable July Wed am pm Proposal submission END OF QUESTION PAPE
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started