Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This assignment has two parts - in the first, you're attacking a system. In the second, you're defending. Your target is a TP-Link NC200

 

This assignment has two parts - in the first, you're attacking a system. In the second, you're defending. Your target is a TP-Link NC200 cloud camera. It's in my office, in my house, and you don't like me very much because I just gave you this assignment. What kind of campaign are you going to execute to get back at me? Design the campaign architecture in detail. Once the architecture is designed, what's the attack surface of the camera? Define the attack vectors of the attack surface. Which vectors are vulnerable? do any of them have available exploits? if so can you make any of those vectors available to you? I'm not that concerned that you find or don't find an exploitable path. I want to see how you approach the problem, and what the results of your analysis are. Now that you've defined how you're going to attack my camera, you've had a change of heart, because you find my lectures so entertaining. You've decided to help me defend my camera instead. What are your suggestions based on your attack surface analysis? You'll submit a paper in APA format. The paper MUST be in PDF format, otherwise I won't grade it. I also expect the paper to be well written, and grammatically correct (no contractions, please). Please use figures to illustrate your points! I expect at least two figures and will deduct a point for each figure missing. With correct grammar, formatting, and writing, I'll grade the report based on these criteria: (20%) Is the campaign well thought out and does it address all the key aspects of a campaign design? (50%) Is the attack surface well defined, researched, and explored? (30%) Are the defensive suggestions sound?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

The image youve provided is a screenshot of an assignment with specific instructions for a cybersecurity exercise that involves both attacking and def... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Foundations of Financial Management

Authors: Stanley Block, Geoffrey Hirt, Bartley Danielsen, Doug Short, Michael Perretta

10th Canadian edition

1259261018, 1259261015, 978-1259024979

More Books

Students also viewed these Algorithms questions