Assignment Problem: Vulnerability Investigation
Learning outcomes:
A. Design and maintain a defensible computer host.
B. Apply relevant computer security principles, tools and techniques.
C. Explain, critically analyze and evaluate host-based security principles, tools and techniques.
D. Solve problems systematically.
Assessment Task:
In this coursework you are expected to:
Problem 1: Examine a known vulnerability present in software running on a host-machine or network component. The vulnerability should be chosen from one of the topic areas covered in the module. For example:
- Host-based security: software security, flaws in programs (buffer overflows, stack smashing), access control mechanisms (ACLs, UNIX file permissions, MAC, DAC, RBAC), authentication technologies (passwords, password management, biometrics, tokens, multi-factor)
- Network security: security protocols, cryptography (e.g., AES, RSA, digital signatures, key management (PKI, x.509)), link-layer security (e.g., ARP cache poisoning), transport-layer security (e.g., TLS), application-layer security (e.g., DNS/DNSSEC, firewalls, intrusion detection systems, wireless and mobile security)
Problem 2: Analyze the underlying flaw, including describing technical details and making appropriate reference to the academic literature, the CVE and CWE databases.
Problem 3: Find an exploit for this vulnerability and demonstrate how a successful attack can be launched in a virtual environment.
Problem 4: Investigate how this particular attack can be detected, for example by a system administrator.
Problem 5: Critically analyze countermeasures that can prevent or at least mitigate the risk of this attack, making appropriate reference to security design principles.
Resolve all your academic problems with Tutorsglobe - One of the best ways to get the top-notch Vulnerability Investigation Assignment Help service!
Tags: Vulnerability Investigation Assignment Help, Vulnerability Investigation Homework Help, Vulnerability Investigation Coursework, Vulnerability Investigation Solved Assignments
Attachment:- Vulnerability Investigation.rar