Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Ict338 Information Security Challenges Assessment Answer

Part 1: Using Wireshark for network traffic analysis Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.  You will use Wireshark to analyse network traffic for attacks. Depending on the OS of your machine, download and install Wireshark from this link.  Question 1 (a) Cheryl the system administrator has discovered malicious reverse shell connection activities while performing a routine check on her company web server’s log. She has managed to retrieve a wireshark capture of the malicious network activities for further investigation. Apply the use of wireshark and analyze the given network trafficQ1a.pcap and answer all the questions below.Q1a.pcap (i) What is the web server’s IP address?(ii) What is the attacker’s IP address?July Semester 2020 (iii) What are the transport layer protocol and port number used for the reverse shell connection? (iv) What are the Operating System and the version running on the web server?(v) What is the name of the malicious script used to perform the reverse shell connection? (b) Salah the network administrator has discovered suspicious activities while performing a check on his company router’s network log. He has managed to retrieve a wireshark capture of the suspicious network activities for further investigation. Apply the use of wireshark and analyze the given captured network traffic Q1b.pcap and answer all the questions below. Q1b.pcap (i) What is the attacker’s IP address?  (ii) From the captured traffic [packet number 1-17], provide details on the type of attack, objective, technique and tool used by the attacker.Analyze and evaluate the packets from packet number 64 onwards. (iii) What is the objective of the attacker?  (iv) Provide a countermeasure and explain how the pros and cons of the countermeasure against the attack identified. – July Semester 2020 Part 2: Signature-based malware detection using regular expression Malware has threatened computers, networks, and infrastructures since the 1980s. There are two major technologies to defend against this, but most organizations rely almost exclusively on just one approach, the decade’s old signature-based methodology. The more advanced method of detecting malware via behaviour analysis is gaining rapid attraction but is still largely unfamiliar. Signature-based malware detection is used to identify "known" malware. In computing, all objects have attributes that can be used to create a unique signature. Algorithms can quickly and efficiently scan an object to determine its digital signature. When an anti-malware solution provider identifies an object as malicious, its signature is added to a database of known malware. These repositories may contain hundreds of millions of signatures that identify malicious objects. This method of identifying malicious objects has been the primary technique used by malware products and remains the base approach used by the latest firewalls, email and network gateways. Signature-based malware detection technology has several strengths, the main being simply that it is well known and understood – the very first anti-virus programs used this approach. It is also speedy, simple to run, and widely available. Above all else, it provides good protection from the many millions of older, but still active threats. You will use PCRE (Perl Compatible Regular Expressions) to write simple programs to detect malware based on given signature patterns. Refer to the document below for a summary of the PCRE syntax. You can also go to https://regex101.com/ for an online testing environment. SETUP Double click on the zip file below. . For example, if your PCRE is in the file demopattern.txt, and the malware signature to be tested is in demosignature.txt, you can type in the command pcre2grep.exe -o -f demopattern.txt demosignature.txt, followed by Enter key. The malware signature of "DODO" is detected and printed out on the screen. Question 2 TWO (2) different malwares have been released recently by hackers. For each of the malwares, apply a regular expression to detect the signature of the malware among the FIVE (5) given malware signatures. Provide the regular expression used for each of the malwares and screenshot of the detection process. Screenshots must be provided from the command prompt of your computer. (a) Malware C has a signature consisting of seven to nine leading lowercase alphabets excluding the alphabets b,f,h,j,r,y,z, followed by an optional number ranging from 2 to 7. After which, there are at least four, but not more than six uppercase alphabets. An exclamation mark optionally follows, after which the signature will end with an uppercase B, F, G or Z. Example of a malware C signature looks like " ctllola3GUMQG!G", " xpmmueo7JCPURDB" or " sxdgcvcxDTVSNZ" (b) Malware D has a signature consisting of at least two, but not more than seven leading numbers, followed by one or two hyphens. A lowercase alphabet excluding the vowels optionally follows, after which follows at least one but not more than three alternating pair of characters consisting of either upper or lowercase of alphabets "J" and "K". The malware signature may optionally end with a "#" or "@" symbol. Samples of malware signature include "59-jk", "3488488--jKJkJK#" and "[email protected]".Due to the COVID-19 situation, the city of Corona is calling for a proposal for a Quarantine Monitoring System (QMS) in everyone's home to keep track of those who are under home quarantine. QMS needs to keep track of the person's health parameters such as temperature, heart rate, and whether the person has left the house without authorization. Once an abnormal situation occurs, QMS will send an alert to the police which is nearest to the location for investigation. QMS must be accessible by authorized users anytime and anywhere. Using concepts of smart computing which you have learnt in this module, propose a design which will satisfy all the given requirement. Assess the merits of your design, as well as critique any other potential issues such as security and privacy of data. (a) Demonstrate your design in a diagram showing all the required components/devices taking into considerations of the above requirements. (b) Explain how the various components of your design can work together seamlessly to provide the requirements needed by the Corona Government. (c) After the implementation of QMS, a policeman receives an alert on his mobile phone QMS app on a potential situation for further investigation shown in Figure Q3(c) below. Based on the given diagram showing what he is seeing immediately after receiving the alert, assess potential security issues with the QMS mobile app and critique on how security can be improved




Buy Ict338 Information Security Challenges Assessment Answers Online


Talk to our expert to get the help with Ict338 Information Security Challenges Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for Ict338 Information Security Challenges Assessment Answer Assignment Help Online

Resources

    • 24 x 7 Availability.
    • Trained and Certified Experts.
    • Deadline Guaranteed.
    • Plagiarism Free.
    • Privacy Guaranteed.
    • Free download.
    • Online help for all project.
    • Homework Help Services
); }
Copyright © 2009-2023 UrgentHomework.com, All right reserved.