Course Learning Outcomes:
1) Analyze and evaluate the organizational adoption of security controls
2) Design solutions for concrete security problems for distributed applications
3) Formulate and evaluate security countermeasures to reduce potential security risks
4) Analyze emerging security threats and controls.
Assignment Details:
Assignment 1:
Assignment type: Practical and Written Assessment, Individual assignment (1,000 words).
Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. This assessment contributes to learning outcomes a, b.
Assignment topic: Firewall Setup and Configuration
Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications. The assignment consists of two parts.
Part A: Use Nmap - a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.
Features of Nmap:
o Host discovery: useful for identifying hosts in any network
o Port scanning: lets you enumerate open ports on the local or remote host
o OS detection: useful for fetching operating system and hardware information about any connected device
o App version detection: allows you to determine application name and version number
o Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE) Part B:
Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.
Case Study for the Assignment:
Carpathian Corporation has grown and needs increased security and additional capacity in the form of a new firewall. If the Carpathian Corporation wants to continue with its proposed plan for self-hosting, it needs to consider the security-related issues. It is taking the right steps by asking what security ramifications should be addressed prior to making the purchase. The Carpathian IT staff needs to take a good look at the risk factors involved with providing for its own Internet services (web servers) and where the pitfalls might occur: Security policies provide information for network users for using and auditing the network. Firewall is considered to be a part of the security policy providing necessary protection to the network and the applications.
You have been hired as the Chief Security Officer of Carpathian Corporation and its top management urges you to design the required firewall for the organization's network. Looking into the requirements of the security and adhering to information security policy you are required to provide firewall settings to secure the network from different types of possible attacks that can harm the business network.
Part A: Perform the following task.
1. Use Nmap from Kali on your Virtual Box
2. Write an introduction to include the description of the tool
3. Demonstrate four tasks Nmap can perform with respect to host scanning, domain and port scanning. The discussion should include the name and brief description of the threat and must be supported by screenshots.
4. From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation's assets.
Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux.
The list of commands is provided below:
Command
|
Description
|
Ufw status
|
To check firewall status
|
Ufw enable
|
Enable firewall
|
Ufw allow
|
Allow services, port range and network
|
Ufw deny
|
Blocking a service
|
1. Check the firewall status
2. Enable or disable the firewall accordingly
3. Allow services such as TCP, SSH and samba using their port number or name
4. Verify the firewall rules after adding the above services
5. Enable the appropriate ports for the secure web server applications on a network
6. Execute commands for allowing and denying a range of ports
7. Verify the firewall rules
8. Allow HTTP from a specific subnet to access your web services
Our Cyber Security Assignment Help service always deliver the finest assignment solutions within the given time period. We never miss any deadlines.
Tags: Cyber Security Assignment Help, Cyber Security Homework Help, Cyber Security Coursework, Cyber Security Solved Assignments
Attachment:- Cyber Security.rar