Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assignment Description Network security is a process to secure the computer network system from all sorts of security threats, including threats to the physical set up. In this assignment, your task...

1 answer below »

Assignment Description

Network security is a process to secure the computer network system from all sorts of security threats, including threats to the physical set up. In this assignment, your task is to identify and evaluate network security threats that relate to network monitoring. You may, for example, investigate the network in the Institute, at your home or of the Internet by using any network security tool.

Use any TWO open source network monitoring and analysis tool mentioned below:

 GFI LanGuard  PRTG
 Nmap
 Metasploit
 TCPdump
 Open VAS

After scanning the network, compare and discus results on the threats these tools could be used for network monitoring and analysis. Also provide appropriate mitigation and countermeasure strategies for the identified threats and vulnerabilities.

Submission Guidelines

Your report should include and discuss all the results in detail with appropriate screenshots. Report should investigate and show originality of work, and be different from others.

Marking criteria:

Section to be included in the report

Description of the section

Marks

Introduction

Appropriately select a tool and discuss how it detects and exploit network vulnerabilities

3

Literature Review

Related to your topic, discuss major methodologies related to network security threats and attacks

10

Network Security Tools

Discuss how you identify and analyse network security threats. Provide detailed description of all threats with appropriate screenshots.

20

Threat Mitigation Techniques

Discuss in detail mitigation techniques for the selected vulnerabilities in your report

10

Conclusion

Summarize your findings in report with valid comments

2

Reference style

Appropriate IEEE referencing style and report presentation

5

Total

50

Prepared by: Mr. Naveed Dilber Moderated by: Dr. Javed Baloch, July, 2018

BN203 Assignment 2 Page 3 of 3 Marking Rubric: Total Marks 50

Grade Mark

HD 40-50

DI 35-39

CR 30-34

P 25-29

Fail

Excellent

Very Good

Good

Satisfactory

Unsatisfactory

Introduction /3

All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated

Topics are relevant and soundly analysed.

Generally relevant and analysed.

Some relevance and briefly presented.

This is not relevant to the assignment topic.

Literature Review /10

Finding is clearly linked and well justified

Finding is clearly linked and justified

Finding is linked and convincing

Finding is not linked and unjustified

Finding is not available

Network Security Tools /20

Exceptional discussion on security threats for the system with appropriate tools. Identifying highly sophisticated and well referenced vulnerabilities

Exceptional discussion on security threat for the system with appropriate tools however results not explained in detail.

Discussion on security threat are generic and covered some aspect of assessment with relevant tools

Discussion on Two security threats using tools are generic and lack detail

Unable to clearly explain security threat using tools

Threat Mitigation Techniques /10

Advance discussion on threats mitigation using latest technologies and procedures

Good discussion on threats mitigation using technologies and procedures

Good discussion on threats and mitigation

Discussion on threats and mitigation but it needs to be improved.

Lacking discussion on threats and mitigation

Conclusion /2

A very powerful conclusion with full confidence.

Very Good Conclusion

Appearance made and good conclusion provided

Appearance made and conclusion provided.

Barely appear at the end of the video.

Reference style
/5

Clear styles with excellent source of references.

Clear referencing style

Answered Same Day Sep 14, 2020 BN203

Solution

Amit answered on Sep 19 2020
145 Votes
Full Name :
    
    Student ID :
    
    Subject :
    
    Assignment No :
    
    Due Date :
    
    Lecturer’s Name :
    
Nmap and PRTG for finding network vulnerabilities
Your Name:
Your Email:
College name, University name, Country name
Table of Contents
1.    Introduction to Nmap and PRTG    3
2.    Literature reviews on findings    3
3.    Result analysis of network vulnerabilities with Nmap and PRTG    4
4.    Mitigation techniques of threats    10
5.    Conclusion    11
6.    References:    12
1. Introduction to Nmap and PRTG
For finding the network vulnerabilities, the network monitoring tools are playing very important and critical role in modern era. By network monitoring, the occu
ed vulnerabilities to network can be identified and network security can easily be improved.
The Nmap and PRTG are freeware tools available for network monitoring. The Nmap application provides a service and host discovery by creating a map of complete network. For identifying the network vulnerabilities, the specially created packets are send to all connected hosts to network by Nmap and on bases of their response, the network vulnerabilities are identified. Most of the OS are supported by Nmap. The facilities of accepting a scan during congestion and latency makes Nmap suitable to find network vulnerabilities. The Nmap includes the main features to detection of vulnerability, detection of advance services and discovery of network services and connected hosts [Shand & Tryfonas, 2008].
Like Nmap, “Paessler Route Traffic Grapher” commonly known as PRTG is another network monitoring tool to find the network vulnerabilities. The SNMP frames are being analyzed by PRTG and a graph of result is generated, so that any vulnerability to complete network traffic can be identified. The sniff facility of PRTG for identifying network vulnerabilities makes it very suitable for network monitoring.
2. Literature reviews on findings
The network security threats can occur from different methodologies deployed by any attacker or inducer. The attackers can make use of below listed methodologies for creating issues to created network:
1. Malware: It is small computer program which creates Trojan horses, malicious root kits, worms and viruses for create network. The infection from one node to other is distributed by this methodology and complete network security issues are a
ived.
2. Spyware: This is another technique used to create network security issues in a spy manner. The Trojan software is used by cyber criminals to record the activities of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here