Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now

Word Count Minimum 1500, Maximum 2000 Assessment Description After undertaking initial stealthy reconnaissance to identify IP address spaces of interest, network scanning is an intrusive and aggressive process used to identify accessible hosts and their network services. Performing both network scanning and reconnaissance tasks paints a clear picture of the network topology and its security features.The rationale behind IP network scanning is to gain insight into the following elements of a given network: • ICMP message types that generate responses from target hosts • Accessible TCP and UDP network services running on the target hosts • Operating platforms of target hosts and their configurations • Areas of vulnerability within target host IP stack implementations (including sequence number predictability for TCP spoofing and session hijacking) • Configuration of filtering and security systems (including firewalls, border routers, switches, and IDS/IPS mechanisms) Source: Chris McNab (2008), Network Security Assessment, O’Reilly 2nd Edition This assessment requires you to do literature search on internet, magazines, publications, textbook etc. This is an individual assignment, therefore it is very important to write the findings in your own words. Choose ONE of the following topics: 1) ICMP Probing 2) TCP Port Scanning 3) UDP Port Scanning 4) IDS/IPS Evasion 5) Low Level IP Assessment At minimum your report should address the following: A) Discuss your chosen topic. B) Explain what kind of security measures/threats it provides to the network. C) Identify three security vulnerabilities. D) Discuss how these threats can be mitigated. E) Conclusion/Summarize. Marking Criteria: Section to be included in the report Description of the section Marks Introduction Description of selected topic 4 Security Measures/Threats Analyse identified Threats 10 Security Vulnerabilities Researching vulnerablities 10 Threats Mitigation Finding threats mitigation 10 Conclusion Summary of report 3 Reference Style Follow IEEE reference style 3 Total 40

Word Count Minimum 1500, Maximum 2000

 

 

Assessment Description

 

After undertaking initial stealthy reconnaissance to identify IP address spaces of interest, network scanning is an intrusive and aggressive process used to identify accessible hosts and their network services. Performing both network scanning and reconnaissance tasks paints a clear picture of the network topology and its security features.The rationale behind IP network scanning is to gain insight into the following elements of a given network:

  • ICMP message types that generate responses from target hosts
  • Accessible TCP and UDP network services running on the target hosts
  • Operating platforms of target hosts and their configurations
  • Areas of vulnerability within target host IP stack implementations (including sequence number predictability for TCP spoofing and session hijacking)
  • Configuration of filtering and security systems (including firewalls, border routers, switches, and IDS/IPS mechanisms)

Source: Chris McNab (2008), Network Security Assessment, O’Reilly 2nd Edition
This assessment requires you to do literature search on internet, magazines, publications, textbook etc. This is an individual assignment, therefore it is very important to write the findings in your own words.

 

Choose ONE of the following topics:

 

  • ICMP Probing
  • TCP Port Scanning
  • UDP Port Scanning
  • IDS/IPS Evasion
  • Low Level IP Assessment

 

 

At minimum your report should address the following:

 

  1. Discuss your chosen topic.
  2. Explain what kind of security measures/threats it provides to the network.
  3. Identify three security vulnerabilities.
  4. Discuss how these threats can be mitigated.
  5. Conclusion/Summarize.

 

Marking Criteria:

Section to be included in the report Description of the section Marks
Introduction Description of selected topic 4
Security Measures/Threats Analyse identified Threats        10
Security Vulnerabilities Researching vulnerablities 10
Threats Mitigation Finding threats mitigation 10
Conclusion Summary of report 3
Reference Style Follow IEEE reference style 3
  Total 40

 

Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now