Testing and Securing Computer networks and Systems Performan…

DO NOT REQUEST WITHOUT READING THIS FIRST!!

Due to the numerous and increasingly malicious attacks on computer networks and systems, current security tools are often not enough to resolve the issues related to illegal users, reliability, and to provide robust network security. Recent research has indicated that although network security has developed, a major concern about an increase in illegal intrusions is still occurring. Addressing security on every occasion or in every place is an important and sensitive matter for many users, businesses, governments and enterprises. A Network Intrusion Detection and Prevention System (NIDPS) is one of the most tested, reliable, and strongest forms of technology used to sniff out network packets, monitor incoming and outgoing network traffic, and identify the unauthorised usage and mishandling of computer system networks. It can provide a better understanding of the things that are really happening on the network. In addition, an NIDPS has the potential to detect, prevent, and report any evidence of attacks and malicious traffic.

However, due to the wide-ranging environments and platforms that are in use, and the lack of security awareness by many users, network security is a complex task. This has resulted in a high level of traffic/data loss or theft amongst business users, particularly in relation to information or networked systems accessed via physical or virtual networks and systems interfaces. This assignment allows you to build your knowledge and understanding of the theoretical and practical issues in network & system security architectures. In particular, you will demonstrate the threats to networked computers and ways in which these threats may be mitigated by the deployment of appropriate security countermeasures.

To pass the coursework you must

demonstrate your understanding of securing system including computer networks, web applications, or servers based on security technologies (e.g., Intrusion Detection and Prevention System (IDPS), Firewall, or others such as antivirus, malware, etc) using a virtual operating system (Ubuntu);

demonstrate your understanding of securing a network and system by building on work conducted in lecture and lab sessions;

test security performance for your network (which consists of local hosts, vulnerable web application or servers) when it faces different attacks techniques e.g., SQLi attacks, Backdoor attacks, flood attacks (TCP, UDP, ICMP, HTTP), high-speed malicious traffic, Mitigate attacks (PacketTracer), etc;

use various proactive and reactive security tools and techniques to test security performance of your network and system implementation. This builds on experience gained in lab sessions to provide a practical demonstration of securing systems or computer networks in general.

This is an individual-based coursework.

Assessment Scenario/Problem

You will work individually. You are required to:

  1. Research and report on security challenges for networks or systems including web applications, computer networks or servers. This section should be approximately 800 words long.
  2. You will then set up a prototype network. Here and as an optional, you can choose one of 3 (three) following options:
  3. a. The prototype network consisted of 3 (three) virtual stations including (e.g., Ubuntu Mate 22.04 (IDPS), Kali, and Vulnerable web application) connected together in one internal network.
  4. b. The prototype network consisted of 2 (two) virtual stations including (e.g., kali and Vulnerable web application) connected in one internal network.
  5. c. The prototype system consisted of one virtual station including e.g., internal web application.

Equal marks will be given whichever option is chosen because there are different challenges involved in each option. Some options may be more suitable for computers with limited capacity.

Several tools and hackers techniques (which were introduced in the lab sessions and should find out more by your research) can be used to test your network or system security performance. You should use Snort IDPS to test your systems security (analysis, detection and prevention performance). The result should be reported and discussed.

  1. You must detail your testing strategy, for example, discussing the implementation of tools and techniques (introduced in lab sessions and identified by your research) that would aid you in this task.
  2. Then you should implement your security testing strategy for your system (VM) security, detail the results obtained, and evaluate the security of system. You are encouraged to make recommendations on (a) how the networking and systems may have its security improved. (b) how to raise the level of security of OS to meet the needs for Internet readiness and to demonstrate that the system is secure by employing appropriate tools and techniques introduced in the lab sessions and identified by your research. This section should consider 2 or 3 issues such as access control, remote access applications, OS, network interfaces, network security architecture and maybe others. The level of security required is medium, i.e. it provides an appropriate level of security (ensuring confidentiality, integrity and availability) for systems providing services over networks. You will demonstrate that the required level of security of your e.g., Ubuntu IDPS has been achieved by employing appropriate tools and techniques. This part of the coursework will use screenshots and textual descriptions to illustrate any practical work undertaken. This section will be supported with references to papers in journals, conference proceedings, Web sites or books on securing computer systems.
  3. Each student is required to write a reflective statement based on skills learned from the module and coursework. Your reflective statements should be approximately 300 words. It will reflect on the skills learned in completing this coursework.
  4. You must give a demonstration of your overall system and its network security. This part of the coursework should use screenshots and textual descriptions to illustrate any practical work undertaken.

Your report should not exceed 4000 words (excluding references and appendices). You are encouraged to link any references in the practical elements of the assignment to relevant and related academic literature. Particular care should be made to ensure that the report contains correct references to all cited work in an appropriate style, e.g., the Harvard Referencing System.

Summary of COURSEWORK 2. Please see task 1 to 6 below. Also I have included sample coursework 2 under assessments in the learning room.

To pass the coursework you must

demonstrate your understanding of securing system including computer networks, web applications, or servers based on security technologies (e.g., Intrusion Detection and Prevention System (IDPS), Firewall, or others such as antivirus, malware, etc) using a virtual operating system (Ubuntu);

demonstrate your understanding of securing a network and system by building on work conducted in lecture and lab sessions;

test security performance for your network (which consists of local hosts, vulnerable web application or servers) when it faces different attack techniques e.g., SQLi attacks, Backdoor attacks, flood attacks (TCP, UDP, ICMP, HTTP), high-speed malicious traffic, Mitigate attacks (PacketTracer), etc;

use various proactive and reactive security tools and techniques to test security performance of your network and system implementation. This builds on experience gained in lab sessions to provide a practical demonstration of securing systems or computer networks in general.

Your Task 1 to 6 as detailed below:

  1. Research and report on security challenges for networks or systems including web applications, computer networks or servers. This section should be approximately 800 words long.
  2. You will then set up a prototype network. Here and as an optional, you can choose one of 3 (three) following options below a, b or c:
  3. a. The prototype network consisted of 3 (three) virtual stations including (e.g., Ubuntu Mate 18.04 (IDPS), Kali, and Vulnerable web application) connected together in one internal network.
  4. b. The prototype network consisted of 2 (two) virtual stations including (e.g., Kali and Vulnerable web application) connected in one internal network.
  5. c. The prototype system consisted of one virtual station including e.g., internal web application.
  6. You must detail your testing strategy, for example, discussing the implementation of tools and techniques (introduced in lab sessions and identified by your research) that would aid you in this task.
  7. Then you should implement your security testing strategy for your system (VM) security, detail the results obtained, and evaluate the security of system. You are encouraged to make recommendations on (a) how the networking and systems may have its security improved, and (b) how to raise the level of security of OS to meet the needs for Internet readiness and to demonstrate that the system is secure by employing appropriate tools and techniques.
  8. Each student is required to write a reflective statement based on skills learned from the module and coursework. The reflective statement should also contain some information about the sections/parts that you did (contributed with) to the report. Your reflective statement should be approximately 300 words. It will reflect on the skills learned in completing this coursework.
  9. You must give a demonstration of your overall system and its network security. This part of the coursework should use screenshots and textual descriptions to illustrate any practical work undertaken.

Your report should not exceed 4000 words (excluding references and appendices).

Please Follow this to the letter and make sure it matches everything required for a good grade, any questions feel free to ask.

I have attached the grading criteria and a sample for your reference please follow the grading criteria to get a First Class Grade.

WRITE MY PAPER


Comments

Leave a Reply