It security frameworks and reference architectures


Learning Outcome: Analyze and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems

Section A: IT Security Frameworks and Reference Architectures

The field of information security contains various supporting structures for implementing security. These structures are called industry-standard frameworks and reference architectures. There are several supporting structures available as templates for creating a secure IT environment. These include ISO, NIST, COBIT, ETSI, RFC, and ISA/IEC [1].

For this Section of the assignment, write a literature review regarding any five security frameworks/architectures by referring to reputed books, journal and conference articles. The discussion in the report must explain following points with proper in-text citations.

  • How these structures are predominately used? Discuss their strengths and weaknesses
  • Discuss the nature of these architectures categorically a) general b) application specific?
  • Recommend the framework/architecture for small business, school, home, office on the basis of an appropriate selection criterion

Section B: Potential threats and mitigation tools for Botnet

The security remains a challenge in networked information systems. The ubiquity and increasing popularity of the cyber physical systems have made networked devices a powerful amplifying platform for cyberattacks. These attacks are mainly carried out by using malicious software (Malware). Generally, Malware are classified based on their primary traits. One of the primary traits of Malware is Payload capabilities.

"One of the most popular payload of Malware today is software that will allow the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks. This infected robot computer is called a bot or zombie. When hundreds, thousands, or even millions of bot computers are gathered into a logical computer network, they create a botnet under the control of a bot herder" [1].

For this Section of the assignment, write a report including the following sections:

  • Addressing the feedback provided in Section A of the assignment
  • Introduction about Botnet and its impact on the society
  • Discussion of any three variants of Botnet
  • Botnet architecture, operation and communication
  • Potential threats posed by a Botnet
  • Recommendations on any two mitigation techniques/tools to tackle the Botnet attack and discuss the effectiveness of the selected tools.
  • Discussion on one Networked Applications targeted/attacked by Botnet from current literature review.

M. Ciampa, Security+ Guide to Network Security Fundamentals, 6th ed. Cengage, 2018.

Assignment Instructions:

  • Assignment-1 should be submitted as MS Word document.
  • Do not use Wikipedia as a source or a reference
  • Must consider at least eight (three for Section A and five for Section B) current references from journal/conference papers and books. Must follow IEEE referencing style.
  • Make sure you properly reference any diagrams/ graphics used in the assignment.

With Network Security Assignment Help service, you can rid of all your academic issues and can get assured top-notch grades with ease.

Tags: Network Security Assignment Help, Network Security Homework Help, Network Security Coursework, Network Security Solved Assignments, Networked Information Systems Assignment Help, Networked Information Systems Homework Help, IT Security Frameworks Assignment Help, IT Security Frameworks Homework Help, Potential threats and mitigation tools for Botnet Assignment Help, Potential threats and mitigation tools for Botnet Homework Help

Attachment:- Overview of Network Security.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: It security frameworks and reference architectures
Reference No:- TGS03049922

Expected delivery within 24 Hours