KING’S OWN INSTITUTE* Success in Higher Education ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 1 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: XXXXXXXXXXCRICOS 03171A ICT...

1 answer below »
assignment 1 from the file (firewall setup and configuration)



KING’S OWN INSTITUTE* Success in Higher Education ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 1 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A ICT 205 CYBER SECURITY T220 All information in the Subject Outline is correct at the time of approval. KOI reserves the right to make changes to the Subject Outline if they become necessary. Any changes require the approval of the KOI Academic Board and will be formally advised to those students who may be affected by email and via Moodle. Information contained within this Subject Outline applies to students enrolled in the trimester as indicated 1. General Information 1.1 Administrative Details Associated HE Award(s) Duration Level Subject Coordinator Bachelor of Information Technology (BIT) 1 trimester Level 2 Dr Smitha Shivhankar [email protected] P: 92833583 L: Level 1-2, 17 O’Connell St. Consultation: via Moodle or by appointment. 1.2 Core / Elective Core subject for BIT 1.3 Subject Weighting Indicated below is the weighting of this subject and the total course points. Subject Credit Points Total Course Credit Points 4 BIT (96 Credit Points) 1.4 Student Workload Indicated below is the expected student workload per week for this subject No. Timetabled Hours/Week* No. Personal Study Hours/Week** Total Workload Hours/Week*** 4 hours/week (2 hour Lecture + 2 hour Tutorial) 6 hours/week 10 hours/week * Total time spent per week at lectures and tutorials ** Total time students are expected to spend per week in studying, completing assignments, etc. *** Combination of timetable hours and personal study. 1.5 Mode of Delivery Blended, that is face-to-face/online 1.6 Pre-requisites ICT 106 Data Communications and Networks 1.7 General Study and Resource Requirements o Dedicated computer laboratories are available for student use. Normally, tutorial classes are conducted in the computer laboratories. o Students are expected to attend classes with the requisite textbook and must read specific chapters prior to each tutorial. This will allow them to actively take part in discussions. Students should have elementary skills in both word processing and electronic spreadsheet software, such as Office 365 or MS Word and MS Excel. o Computers and WIFI facilities are extensively available for student use throughout KOI. Students are encouraged to make use of the campus Library for reference materials. o Students will require access to the internet and email. Where students use their own computers, they should have internet access. KOI will provide access to required software. Approved by KOI Academic Board for T2 2020 mailto:[email protected] ICT205 ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 2 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A Resource requirements specific to this subject: MS Imagine, Office 365. 2 Academic Details 2.1 Overview of the Subject As the Internet becomes more pervasive, so do security threats to our computer systems and communications. Cybersecurity affects the social and economic health of the world. This subject provides students with a grounding in security technology and the fundamentals of encryption systems. Students will learn about types of attacks, access control and authentication, firewalls, wireless network security, intrusion detection systems, and cryptographic techniques and their applications. 2.2 Graduate Attributes for Undergraduate Courses Graduates of Bachelor courses from King’s Own Institute (KOI) will achieve the graduate attributes expected under the Australian Qualifications Framework (2nd edition, January 2013). Graduates at this level will be able to apply a broad and coherent body of knowledge across a range of contexts for the purposes of professional practice or academic scholarship, and as a pathway for further learning. King’s Own Institute’s key generic graduate attributes for a bachelor’s level degree are summarised below: Across the course, these skills are developed progressively at three levels: o Level 1 Foundation – Students learn the basic skills, theories and techniques of the subject and apply them in basic, standalone contexts o Level 2 Intermediate – Students further develop the skills, theories and techniques of the subject and apply them in more complex contexts, and begin to integrate this application with other subjects. o Level 3 Advanced – Students demonstrate an ability to plan, research and apply the skills, theories and techniques of the subject in complex situations, integrating the subject content with a range of other subject disciplines within the context of the course. KOI Bachelor Degree Graduate Attributes Detailed Description Knowledge Current, comprehensive, and coherent and connected knowledge Critical Thinking Critical thinking and creative skills to analyse and synthesise information and evaluate new problems Communication Communication skills for effective reading, writing, listening and presenting in varied modes and contexts and for transferring knowledge and skills to a variety of audiences Information Literacy Information and technological skills for accessing, evaluating, managing and using information professionally Problem Solving Skills Skills to apply logical and creative thinking to solve problems and evaluate solutions Ethical and Cultural Sensitivity Appreciation of ethical principles, cultural sensitivity and social responsibility, both personally and professionally Teamwork Leadership and teamwork skills to collaborate, inspire colleagues and manage responsibly with positive results Professional Skills Professional skills to exercise judgement in planning, problem solving and decision making Approved by KOI Academic Board for T2 2020 ICT205 ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 3 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A 2.3 Subject Learning Outcomes This is a Level 2 subject. On successful completion of this subject, students should be able to: Subject Learning Outcomes Contribution to Graduate Attributes a) Analyse and evaluate the organisational adoption of security controls b) Design solutions for concrete security problems for distributed applications c) Formulate and evaluate security countermeasures to reduce potential security risks d) Analyse emerging security threats and controls. 2.4 Subject Content and Structure Below are details of the subject content and how it is structured, including specific topics covered in lectures and tutorials. Reading refers to the text unless otherwise indicated. Weekly Planner: Week (beginning) Topic covered in each week’s lecture Reading(s) Expected work as listed in Moodle 1 06 Jul Introduction to network security Ch. 1 Complete exercises in Tutorials on challenges of securing information, information security and types of attackers. Formative not graded 2 13 Jul Malware and social engineering attacks Ch. 2 Complete exercises in Tutorials on basic steps of an attack and principles of defence and different types of malware and payloads of malware. Formative not graded. 3 20 Jul Applications network attacks and risk mitigation Ch. 15 Complete exercises in Tutorials on client-side attacks, overflow attacks and different types of networking- based attacks. Formative not graded. 4 27 Jul Vulnerability assessment and data security Ch. 13 Complete exercises in Tutorials. Formative not graded. 5 03 Aug Networking-based and webserver attacks Ch. 5 Complete exercises in Tutorials on securing a host computer and application security. How to secure data. Formative not graded. 6 10 Aug Network security devices, technologies, and design Ch. 6 Complete exercises in Tutorials on network security devices and their uses, network technologies and security. Formative not graded. Assignment 1 due: Report Submission Summative worth 16% 16 Aug 2020 – 23 Aug 2020 Mid trimester break Approved by KOI Academic Board for T2 2020 ICT205 ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE 4 OF 16 *AUSTRALIAN INSTITUTE OF BUSINESS AND MANAGEMENT PTY LTD © ABN: 72 132 629 979 CRICOS 03171A 7 24 Aug Administering a secure network and systems and application security Chs. 7, 9 Complete exercises in Tutorials on network design elements, functions of common network protocols, principles of network administration and how they can be secured. Formative not graded. Assignment 1 due: Demonstration Summative worth 4% 8 31 Aug Wireless network security and mobile and embedded devices Chs. 8, 10 Complete exercises in Tutorials on different types of wireless network attacks and the vulnerabilities in IEEE 802.11 security. Solutions for securing a wireless network. Formative not graded. 9 07 Sep Access management fundamentals Ch. 11 Complete exercises in Tutorials on four access control models, how to implement access control and the different types of authentication services. Formative not graded. 10 14 Sep Authentication and account management Ch. 12 Complete exercises in Tutorials on authentication credentials and account management procedures for securing passwords. Formative not graded. 11 21 Sep Cryptography: hash; symmetric; and asymmetric algorithm Chs. 3, 4 Assignment 2 due: Report Submission Summative worth 25% Complete exercises in Tutorials on cryptography, hash, symmetric, and asymmetric cryptographic algorithms. Formative not graded. 12 28 Sep Business continuity Ch. 14 Assignment 2 due: Presentation Summative worth 5% Complete exercises in Tutorials on how to control risk, ways in which security policies can reduce risk Formative not graded. 13 04 Oct Study review week 14 12 Oct Examination Please see exam timetable for exam date, time and location 15 18 Oct Student
Answered Same DayAug 14, 2021ICT205

Answer To: KING’S OWN INSTITUTE* Success in Higher Education ICT 205 CYBER SECURITY T220 24/06/2020 15:36 PAGE...

Himanshu answered on Aug 15 2021
129 Votes
Firewall Setup and Configuration
This report is focusing on installing the firewall on the network to restrict the unauthorized access. Here we’ll scan the network to ident
ify the various services running on the network. Also we will see what the status of various ports on the network is. We need to install the firewall to secure the open ports and services running on the network. In this article we’ll see how we can scan the network using nmap command, how we can configure the firewall using ufw commands and how we can secure our network to maintain the security and integrity of the host network.
Express Print Services Pty Ltd. is a medium business enterprise whose braches use LAN configuration. Branches are interconnected by WAN. In the given scenario we need to scan the network and then implement the firewall to filter the incoming or outgoing request on that network. For setting up the firewall we’ll use nmap and ufw tool. Nmap is short for the network mapper. It is an open source tool of the Kali Linux. What nmap does is that it identifies the open ports, various devices running on system, host discovering and services offer by them etc. Ufw is the framework that is used for managing the netfilter and it also helps to control the firewall by providing the command line interface.
1. Nmap scanning: The basic nmap scan where 192.168.1.17 is our target.
Command: sudo nmap
· Stealth / SYN Scanning:
Stealth scan looks for open TCP ports but never completes the TCP 3way handshake so nothing go logged into the application
Command: nmap –sS
· TCP Scanning: this requires nmap to complete three way handshakes and it cans only most common 1000 ports.
    
Command: nmap –sT...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here