MN502 Assignment Help IT/networking

Prepared by: Dr. Javed Ali Baloch Moderated b y: Dr. Fariza Sabrina July, 2017 Assessment Details and Submission Guidelines Unit Code MN502 Unit Title Overview of Network Security Assessment Type Individual Assessment Title Demonstration of a network security tool Purpose of the assessment (with ULO Mapping) a) Discuss common threats and attacks on networked information systems b) Identify most common intrusion detection attacks, and discuss how to prevent them c) Apply skills to analyse complex problems in network security under supervision Weight 15% Total Marks 20 Word limit Not Applicable Due Date 01/09 /2017 11:55PM Submission Guidelines  All work must be submitted on Moodle by the due date along with a title Page.  The assignment must be in MS Word format, 1.5 spacing, 11 -pt Calibri (Body) font and 2 .54 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about -mit/institute -publications/policies - procedures -and -guidelines/special considerationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a writte n warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about -mit/institute -publications/policies - procedures -and -guidelines/Plagiarism -Academic -Misconduct -Policy - Procedure . For further information , please refer to the Academic Integrity Section in your Unit Description. MN502 Overview of Network Security Page 2 of 4 Prepared by: Dr. Javed Ali Baloch Moderated b y: Dr. Fariza Sabrina July , 2017 Assignment Description For this assignment you will evaluate one of the Network Security tool s from Table 1 . Marks will be awarded based on the sophistication and the difficulties the demonstration explored. Your task is to complete and make a 4 -5 min video presentation on the following: 1. Download and install (on your computer or on MIT Virtual box) one of the Security Tool from Table 1. 2. Demonstrate (narration of your a ctions recorded by video) 4 tasks the software can perform. (4 * 2.5 = 10 Marks) 3. Outline of your presentation . (3 Marks) 4. Usability of the tool. (3 Marks) 5. Present the results in a video presentation. 6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the Security Tool . (2 + 2 = 5 ) Length of Video: Introduction (30 secs approximately , your appearance should be in the video) + Outline of the presentation (30 secs approximately ) + Demonstration of the task (210 seconds approximately ) + Usability of the Tool (15 seconds approximately ) + Conclusion (15 secs approximately , with appearance) Table 1 Network Security Tool Serial # Software Description 1 Snort Snort is an open source intrusion prevention system for windows and unix. The software enables users to monitor real time traffic and carry out packet logging. https://www.snort.org/ 2 Kismet Wireless Kismet is an 802.11 wireless network detector. Kismet could be used to log traffic and plot detected networks. https://www.kismetwireless.net/ 3 Open SSH Open SSH is an open source security tool, which could be used for remote login to the SSH protocol. Open SSH also enables the user to perform secure tunnel ing. https://www.openssh.com/ 4 Nessus Nessus is a licensed software for vulnerability scanning, however a free trial version is available. Nessus could be used to scan for viruses, malware, backdoors, and hosts communicating with botnet -infected systems. https://www.tenable.com/products/nessus -vulnerability -scanner 5 Security Onion Security Onion is based on Ubuntu. Security Onion provides solutions for intrusion detection, network security monitoring and log management. https://securityonion.net / MN502 Overview of Network Security Page 3 of 4 Prepared by: Dr. Javed Ali Baloch Moderated b y: Dr. Fariza Sabrina July , 2017 You may use any of the available open source software for screen capture. Please find the following as an example.  Software :- https://obsproject.com/ Submission Guidelines: 1. Name your video with your student number and name. 2. Upload Video on your Youtube account 3. Copy the Video Link to a file and 4. Email me the link in a word document including your student ID To upload on Youtube, you must create your account on youtube. If you have a google account (gmail), yo u already have one on youtube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the 'upload' button located at the top right -hand corner of your youtube.com webpage. Make sure you copy+paste your video URL in word document for your marker to be able to watch and mark it! Late submission of assignments will be penalised as follows:  For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day.  For assignments after 5 working days , a penalty of 100% will apply. Your submission must be compatible with the software (PDF/Word/Video) in MIT, Computer Laboratories/Classrooms. Extensions: Under normal circumstances ext ensions will not be granted. In case of extenuating circumstances — such as illness — a Special Consideration form, accompanied by supporting documentation, must be received before 3 working days from the due date.

If granted, an extension will be only gran ted only by the time period stated on the documentation; that is, if the illness medical certificate was for one day, an extension will be granted for one day only . Accordingly the student must submit within that time limit. Penalties may apply for late su bmission without an approved extension. Penalties: Academic misconduct such as cheating and plagiarism incur penalties r a n g i n g from a zero result to program exclusion. MN502 Overview of Network Security Page 4 of 4 Prepared by: Dr. Javed Ali Baloch Moderated b y: Dr. Fariza Sabrina July , 2017 Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Section to be included in the report Description of the section Marks Introduction Student should introduce with his/her physical appearance in the video. 2 Outline Outline of the whole presentation. 3 Demonstration Demonstrate (narration of your actions recorded by video) all st eps from the respective project. 4*2.5 = 10 Usability of the tool Discuss the applications of the tool 3 Conclusion With appearance , draw a conclusion on your experience with the Security Software. 2 Total 20 Marking Rubric for Assignment #1: Total Marks 2 0 Grade Mark HD 16 -20 DI 14 -15 CR 12 -13 P 10 -11 Fail <10 Excellent Very Good Good Satisfactory Unsatisfactory Introduction/ 2 Appearance is clear, easy to follow, well prepared and professional Appearance is clear and easy to follow. Appearance is clear and understandable Makes an appearance and provides an introduction . Does not make an appearance in the video at the start of video Outline /3 Create a very nice bullet point outline and well present ed it before the demonstration started A bullet point outline is provided and presented before the start of the presentation Explained but no screen showing a written outline Very d ifficult to understand overview. The overview is hardly there, missing explanation Demonstrati on/10 Very profession - al, clear and easy to follow. Professional, clear and easy to follow Clear and easy to follow but lacks professionalism Difficult to follow Tasks have not been demo nstrated Usability /3 Clear, professional and easy to follow Clear professional usability Well discussed usability Usability Discussed Usability is difficult to understand Conclusion/2 A very powerful conclusion with full confidence. Very Good Conclusion Appearance made and good conclusion provided Appearance made and c onclusion provided . Barely appear at the end of the video .