Assignment Task
Task
Assessment task details and instructions
This assignment is worth 50% of the formal assessment for the module and it is therefore compulsory. Read this document carefully and make sure you are clear about what you have to do, and what you have to hand in before you attempt the assignment.
Lectures will be used to introduce and discuss important concepts and techniques of cryptography, network security and privacy, which will then be practised in more detail in practical classes. You will be required to demonstrate your knowledge and skills by completing the tasks of this assignment. This assignment is composed of one written report and a demo of the practical activity.
A-Plus Writing Help For University Students
Get expert assistance in any academic field. All courses and programs covered.
Get Help Now!- This assignment must be conducted in groups of 2 students only
- In the practical activity, you need to put together the information that you have learned in the workshop sessions to build a single secure system. For this assignment, you are required to submit an assignment report producing a detailed walkthrough for each task, explaining techniques used and including relevant screenshots where appropriate.
You have to construct a Screened Subnet firewall, with some services and some protection. The basic arrangement is as shown below, but you can add extra if you want. It can be done with virtualisation or with real networks.
The network should have 3 hosts:
1. The First host should serve as a router, and should have a firewall that will filter requests. It should allow only limited SSH traffic, from the set list of hosts, and HTTP traffic and block all other kinds of traffic. This machine should have a Network-based intrusion detection system installed (SNORT). In the development of NIDS rules, you should be focusing on practical attacks, such as syn flood, and trying to prevent some web application attacks.
2. The second host should serve as a bastion host. It should have installed an HTTP proxy that will be examining all HTTP traffic and Host-based IDS. It is expected that this host will be able to examine requests and stop a fair share of some web application attacks, such as XSS and SQL injection. Also, HIDS should be checking for file integrity, changes to the admin group (e.g. adding new users), and changes to user privileges.
3. The third machine serves as an HTTP and SSH server. It should provide working services and have installed HIDS that will be checking for file integrity, changes to admin group (e.g. adding new users), and changes to user privileges.
In your report, you should describe your implementation process and rules, and critically assess them. You should discuss the benefits and limits of the network configuration, firewall, HIDS and NIDS rules. You are required to implement various security policies to ensure the security of the company’s network, including
a. Implement proper user password policies.
b. Regulate work-time behaviour by blocking web browsing of certain websites and using certain apps, such as Facebook and Youtube. However, you should provide proper access to different websites for employees of different departments, e.g., sale or advertisement.
Knowledge and Understanding
1. Model a range of threats, and apply proper methods for protecting networked systems and users against real-world attacks
Practical, Professional or Subject Specific Skills
2. Think like an adversary, demonstrating possible attacks on networked systems;
3. Take a critical approach to research, development and maintenance of advanced networking systems; and
4. Apply a range of techniques to exploit vulnerabilities and assumptions made during system design and implementation
Module Aims
1. To provide a detailed understanding of diverse threats to, and attacks on, networked systems;
2. To study emerging networked systems and their security challenges, e.g., IoT, Cloud, SDN;
3. To define the concept of privacy, and identify its challenges and its legal and social aspects;
4. To analyse the use of cryptographic algorithms in implementing secure network communications and in the preservation of privacy.
This IT Computer Science Assignment has been solved by our IT Computer Science Expert at TV Assignment Help. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered.
You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction
Welcome to our Online Essay Writing Agency. Securing higher grades costing your pocket? Order your assignment online at the lowest price now! Our online essay writers are able to provide high-quality assignment help within your deadline. With our homework writing company, you can order essays, term papers, research papers, capstone projects, movie review, presentation, annotated bibliography, reaction paper, research proposal, discussion, or another assignment without having to worry about its originality – we offer 100% original content written completely from scratch
We write papers within your selected deadline. Just share the instructions