NETWORK SECURITY REPORT WRITING ASSIGNMENT (NO PLAGIARISM WORK NEEDED)

Word Count

Minimum 1500, Maximum 2000



Assessment Description


After undertaking initial stealthy reconnaissance to identify IP address spaces of interest, network scanning is an intrusive and aggressive process used to identify accessible hosts and their network services. Performing both network scanning and reconnaissance tasks paints a clear picture of the network topology and its security features. The rationale behind IP network scanning is to gain insight into the following elements of a given network:


• ICMP message types that generate responses from target hosts

• Accessible TCP and UDP network services running on the target hosts

• Operating platforms of target hosts and their configurations

• Areas of vulnerability within target host IP stack implementations (including sequence number predictability for TCP spoofing and session hijacking)

• Configuration of filtering and security systems (including firewalls, border routers, switches, and IDS/IPS mechanisms)

Source: Chris McNab (2008), Network Security Assessment, O’Reilly 2nd Edition


This assessment requires you to do literature search on internet, magazines, publications, textbook etc. This is an individual assignment, therefore it is very important to write the findings in your own words.


Choose ONE of the following topics:


  1. ICMP Probing

  2. TCP Port Scanning

  3. UDP Port Scanning

  4. IDS/IPS Evasion

  5. Low Level IP Assessment



At minimum your report should address the following:


  1. Discuss your chosen topic.

  2. Explain what kind of security measures/threats it provides to the network.

  3. Identify three security vulnerabilities.

  4. Discuss how these threats can be mitigated.

  5. Conclusion/Summarize.


Marking Criteria:

Section to be included in the report

Description of the section

Marks

Introduction

Description of selected topic

Security Measures/Threats

Analyse identified Threats

10

Security Vulnerabilities

Researching vulnerablities

10

Threats Mitigation

Finding threats mitigation

10

Conclusion

Summary of report

Reference Style

Follow IEEE reference style

Total

40