NETWORK SECURITY REPORT WRITING ASSIGNMENT (NO PLAGIARISM WORK NEEDED)
Word Count | Minimum 1500, Maximum 2000 |
Assessment Description
After undertaking initial stealthy reconnaissance to identify IP address spaces of interest, network scanning is an intrusive and aggressive process used to identify accessible hosts and their network services. Performing both network scanning and reconnaissance tasks paints a clear picture of the network topology and its security features. The rationale behind IP network scanning is to gain insight into the following elements of a given network:
• ICMP message types that generate responses from target hosts
• Accessible TCP and UDP network services running on the target hosts
• Operating platforms of target hosts and their configurations
• Areas of vulnerability within target host IP stack implementations (including sequence number predictability for TCP spoofing and session hijacking)
• Configuration of filtering and security systems (including firewalls, border routers, switches, and IDS/IPS mechanisms)
Source: Chris McNab (2008), Network Security Assessment, O’Reilly 2nd Edition
This assessment requires you to do literature search on internet, magazines, publications, textbook etc. This is an individual assignment, therefore it is very important to write the findings in your own words.
Choose ONE of the following topics:
ICMP Probing
TCP Port Scanning
UDP Port Scanning
IDS/IPS Evasion
Low Level IP Assessment
At minimum your report should address the following:
Discuss your chosen topic.
Explain what kind of security measures/threats it provides to the network.
Identify three security vulnerabilities.
Discuss how these threats can be mitigated.
Conclusion/Summarize.
Marking Criteria:
Section to be included in the report | Description of the section | Marks |
Introduction | Description of selected topic | |
Security Measures/Threats | Analyse identified Threats | 10 |
Security Vulnerabilities | Researching vulnerablities | 10 |
Threats Mitigation | Finding threats mitigation | 10 |
Conclusion | Summary of report | |
Reference Style | Follow IEEE reference style | |
Total | 40 |