Critically analyze & evaluate host-based security principles


Assignment Problem: Vulnerability Investigation

Learning outcomes:

A. Design and maintain a defensible computer host.

B. Apply relevant computer security principles, tools and techniques.

C. Explain, critically analyze and evaluate host-based security principles, tools and techniques.

D. Solve problems systematically.

Assessment Task:

In this coursework you are expected to:

Problem 1: Examine a known vulnerability present in software running on a host-machine or network component. The vulnerability should be chosen from one of the topic areas covered in the module. For example:

  • Host-based security: software security, flaws in programs (buffer overflows, stack smashing), access control mechanisms (ACLs, UNIX file permissions, MAC, DAC, RBAC), authentication technologies (passwords, password management, biometrics, tokens, multi-factor)
  • Network security: security protocols, cryptography (e.g., AES, RSA, digital signatures, key management (PKI, x.509)), link-layer security (e.g., ARP cache poisoning), transport-layer security (e.g., TLS), application-layer security (e.g., DNS/DNSSEC, firewalls, intrusion detection systems, wireless and mobile security)

Problem 2: Analyze the underlying flaw, including describing technical details and making appropriate reference to the academic literature, the CVE and CWE databases.

Problem 3: Find an exploit for this vulnerability and demonstrate how a successful attack can be launched in a virtual environment.

Problem 4: Investigate how this particular attack can be detected, for example by a system administrator.

Problem 5: Critically analyze countermeasures that can prevent or at least mitigate the risk of this attack, making appropriate reference to security design principles.

Resolve all your academic problems with Tutorsglobe - One of the best ways to get the top-notch Vulnerability Investigation Assignment Help service!

Tags: Vulnerability Investigation Assignment Help, Vulnerability Investigation Homework Help, Vulnerability Investigation Coursework, Vulnerability Investigation Solved Assignments 

Attachment:- Vulnerability Investigation.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Critically analyze & evaluate host-based security principles
Reference No:- TGS03052179

Expected delivery within 24 Hours