Explain fundamental information security concepts


Learning Outcomes:

1: Be able to explain fundamental information security concepts;

2: Be able to discuss and debate some of the security implications of computer networks, including cryptography;

3: Be able to compare and contrast firewall technologies;

4: Be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;

5: Be able to evaluate some of the key application security concepts and practices;

6: Be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Assessment item - Essay questions and hands-on task

A. Essay Questions

Write minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each Problem according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per Problem will be appropriate.

Problem 1: Research the issue of insider threat in the context of information security and report your findings. Your report should include the following details: what insider threat means, what motivates it, types of threats involved and how to counter it.

Problem 2: Explain with a suitable example, how the Diffie-Hellman key agreement can be used for key negotiation, where more than two participants are involved. Can an attacker who captures the exchanged keying information compute the symmetric session key?

B. Hands-on Task

Port scanners usually generate lists of open, closed, and filtered ports for each scanned IP address and the information is used to identify network vulnerabilities.

In this task, you will run a simple port scan on your computer using the 'Port Scanner' produced by SolarWind. To complete this task, please follow the instructions given below.

Step 1: Download 'Port Scanner'

Step 2: Run portscanner.exe

Step 3: Under 'Scan Configuration', use your IP address in the 'Hostname and IP Address Ranges' box.

Step 4: Complete/select the remaining configurations for 'Port Ranges', 'Protocol' etc. Step 5. Now take a screenshot of your 'Scan Configuration'.

Step 6: Click on the 'SCAN' button to start scanning.

Step 7: Take a screenshot once the scan is complete.

Step 8: Using the 'SAVE RESULTS' tab, save the scan results in a .csv file. Take a screenshot of this scan report.

Admit it or not, but luckily you have come across the most authentic and reasonable IT Security Assignment Help service, which will always help you in fetching notable grades with ease.

Tags: IT Security Assignment Help, IT Security Homework Help, IT Security Coursework, IT Security Solved Assignments, Cryptography Assignment Help, Cryptography Homework Help, Computer Networks Assignment Help, Computer Networks Homework Help

Attachment:- Information security concepts.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Explain fundamental information security concepts
Reference No:- TGS03053438

Expected delivery within 24 Hours