BHI & CAE ASSESSMENT COVER SHEET This form must be attached to the front of all submitted hard copy assessments. Student Details: Student to complete Student Name: Insert your name here Student ID :...

1 answer below »
Hi, i need this assignment done


BHI & CAE ASSESSMENT COVER SHEET This form must be attached to the front of all submitted hard copy assessments. Student Details: Student to complete Student Name: Insert your name here Student ID : Insert your Student ID here Student Declaration: By signing below, I declare that the work submitted here is my own work and it does not include work which is plagiarised, copied in whole or in part from another student or other source such as published books, internet or journals without due acknowledgement in the text. Student Signature: Insert your Signature here Date: Insert the date you submitted this assessment Assessment Details: Teacher to complete Course National ID and Title 22334VIC Certificate IV in Cyber Security Unit/s National ID and Title VU21991 - Implement Network Security Infrastructure for an Organization Instructor Guide Assessment Task number and name Assessment Task 2: Proxy & WLAN vulnerabilities Date due: Sunday after session 8 class Date submitted: Assessor Name: TBA Assessment Result and Feedback Result |_| Satisfactory |_| Not yet Satisfactory Re-submit date if required: Feedback: Assessor’s signature: Date: Assessment Review If you believe that you have been assessed unfairly, you have the right to request an informal assessment review. When your assessment cover sheet is returned to you, you can request an informal review by filling in the section below and returning it to your assessor or the Operations Manager of your area. If you are not satisfied with the outcome, you can apply for a formal review of assessment on the application form located on the Box Hill Institute Website https://goo.gl/Pb3Rtx VCE courses: VCAA rules and regulations replace the above assessment review. Please see your VCE Teacher or VCE Coordinator for further discussion. I request a review of my assessment for the following reasons (not applicable to VCE courses): Student Signature Date Instructions to Student Assessment task name Assessment Task 2: Proxy & WLAN vulnerabilities Assessment task type Report/Questioning/Meeting Time allowed Week 6 - 8 in class and at home as required Where the assessment will take place In timetabled classroom Personal protective equipment required N/A Emergency procedures Report Issues to Teacher or coordinators as appropriate Equipment provided PC on campus during class time Individual or group work Individual & Group Work Support equipment allowed i.e.: calculator, dictionary All tools as appropriate for the assessment Context and conditions of assessment Assessment must be conducted in a safe environment where evidence gathered demonstrates consistent performance of typical activities experienced in the knowledge management – research field of work and include access to: · workplace information systems, equipment and resources · workplace policies and procedures · Case studies and, where possible, real situations. Assessors must satisfy NVR/AQTF assessor requirements. What to submit The completed report is to be submitted to StudentWeb under the Assessment Task 2: Proxy & WLAN vulnerabilities How to submit Submit the completed document (this document) to the Assessment Task 2: Proxy & WLAN vulnerabilities section on StudentWeb. How to present your work Complete this word document and answer all questions in the spaces provided. The coversheet must be submitted when uploading to StudentWeb. How many attempts at assessment are permitted Students will be given 2 attempts to resubmit an assessment; additional attempts must be organized with teacher and student prior to submission. Naming protocol for electronic files ID_AT1_API.doc E.g.: S10054440_AT1_ API.doc All files that do not have this naming convention will be sent back to you as it resembles part of you assessment that the information is corrected handled and stored. How will the assessment judgement be made |_| Observation checklist |_| Exemplar |_|Performance checklist |X| Rubric |_| Answer guide |_| - Safety If at any time during the learning and assessment process, your Trainer/Assessor considers that the safety of any person is at risk they will abort the session. Reasonable Adjustment Students identifying as having a disability may access reasonable adjustment to enable them to participate in training and assessment on the same basis as other students. Students can learn more about this through the Learners with a disability policy and procedure on the Box Hill Institute website http://www.boxhill.edu.au/for-students/student-support or by calling Student Life on 9286 9891, by emailing the Disability liaison service on [email protected] or by calling into the Student Life office at Elgar Campus in E3.G56, just near the cafeteria. Special Consideration Where a student anticipates that a result will be impacted by special circumstances such as ill health or bereavement, application can be made for special consideration. Forms can be accessed from the Student Life office at Elgar Campus in E3.G56 or downloaded at: http://www.boxhill.edu.au/for-students/student-information/forms-and-downloads. VCE courses: Supplementary exam procedures apply. Please see your VCE Teacher or VCE Coordinator for further discussion. VU21991 AT2 – Proxy & WLAN vulnerabilities The following criteria will be used for this assessment: Examine proxy server security issues · Function and operation of a proxy server is summarized. · Proxy server vulnerabilities are identified · Mitigation strategies for proxy server vulnerabilities are defined and demonstrated Investigate Wireless security vulnerabilities · Operation of WLANs as a communication media is summarized · Overview of the 802.11 WLAN standards is explained · Relationship between the Data Layer and the Physical layers for WLANS is defined · WLAN architecture of a typical system is defined and demonstrated · Authentication and Association methods for wireless clients are described and demonstrated · Strengths and weaknesses of WLAN encryption techniques are investigated · Current tools to discover and interrogate WLANS are demonstrated and utilized · WLAN security checklist is developed · 802.1x security authentication standards for WLANS (and wired devices) are summarized Background Information: You have been approached to provide a briefing report to the ABC Widgets Franchise Company as they have heard that both their Proxy Servers and their proposed WLAN infrastructure have vulnerabilities. Your Task: Is to provide a briefing report for the company that: 1. To provide an overview of the function and operation of a typical proxy server 2. To identify at least three (3) security vulnerabilities of a proxy server 3. To provide some strategies and solutions to ABC Widgets Franchise in order to mitigate these vulnerabilities. (This is at an introductory level) 4. To provide an overview of the WLAN possibilities for ABC Widgets Franchise especially: a. The 802.11 standard b. Describe the relationship between the OSI Physical & Data link layers c. Typical WLAN Architecture for one of the ABC Widgets Franchise warehouse/Offices 5. To propose authenticating systems to deploy for increased WLAN security 6. To discuss strengths and weaknesses of WLAN encryption systems 7. To investigate different tools to discover and interrogate WLAN’s 8. To develop a WLAN security checklist that can be deployed at ABC Widgets Franchise 9. To summarize 802.1X security authentication standards for WLANs VU21991 Implement network security infrastructure for an organization AT2 Version 2 Jan 2020
Answered 3 days AfterJun 03, 2021VU21991

Answer To: BHI & CAE ASSESSMENT COVER SHEET This form must be attached to the front of all submitted hard copy...

Deepti answered on Jun 06 2021
137 Votes
Proxy Server
Overview
Proxy server translates the traffic between networks. It separates end-users from destinations that they browse and provide different level of functionality and security to the
m on the basis of their needs. Proxy server has an IP address to which a user sends its web request, the server collects response from the web server and sends it to the requesting user. Types of proxy servers include transparent proxy, anonymous proxy, distorting proxy and high anonymity proxy. A proxy server is capable of changing the IP address of the user so that the web server cannot discover the location of the user.
Vulnerabilities
Proxy server are hard to secure. Decoding HTML is hard and enforcing policies with proxies is hard. Proxies store the original unencrypted IP address of the users. This makes the user vulnerable to attacks in case the IP is hacked. If it is detectable then it becomes easy for an attacker to determine the targets against applications and potential vulnerabilities of the proxy. Proxy server without encryption makes the user vulnerable to attacks. Data would be transmitted as plain text and passwords can be accessed easily. An attacker can hop all over the internet attacking web servers anonymously or he can gain access to a user’s intranet. Attackers may even insert values to proxy header of HTTP requests in automated responses.
Mitigation Strategies
Vulnerabilities in Proxy servers can be mitigated by scanning and finding them using vulnerability management tools. Penetration testing mechanism shall discover vulnerabilities in proxy requests and produce highest discovery accuracy rate. The vulnerability of attackers inserting value to proxy header can be mitigated by creating a content rule for deleting proxy header from incoming requests.
WLAN
Wireless Local Area Network is an application of wireless data communication which covers wide are without wires. The devices on the network communicate via Wi-Fi. WLANs use microwaves, radio...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here