TECH2400 Introduction to Cyber Security Assessment 3 Help
TECH2400 Introduction to Cyber Security Assessment 3 Help
Assessment 3 Information
Subject Code:TECH2400
Subject Name:Introduction to Cyber Security
Assessment Title:Protocol Presentation and Evaluation
Assessment Type:Presentation and Evaluation
Word Count:10Minutes(+/-10%)
Weighting:40%
Total Marks:40
Submission:MyKBS :Week13

Your Task
In TECH2400 Introduction to Cyber Security Assessment 3, you will undertake an individual task focused on conductinga comprehensive protocolanalysisusingWireshark.Yourobjectiveistothoroughlyexaminethenetworkprotocol trafficcapturedinthedumpfile,delvingintoitsvariousaspectstogainvaluableinsights.Building uponyour analysis, you will createacompelling presentation that not only highlights your findings but also establishes connections to the key concepts covered in class, showcasing your understandingoflearningoutcomeLO1.Thisassessmentservesasameanstoevaluateyour proficiency in network protocol analysis and your ability to apply this knowledge in practical scenarios.Additionally,itprovidesanexcellentopportunityforyoutodemonstrateyourskillsin analysingreal-worldnetworktrafficandeffectivelypresentingyourfindings.
Furthermore, this assessment requires you to defend your recommendations to diverse stakeholders,whichinvolvesarticulatingyourproposedstrategies,mitigations,andsolutionsina mannerthataddressestheconcernsandprioritiesofvariousstakeholders.Moreover,itexpects you to contextualise the terminology associated with cybersecurity in a way that is accessible and understandable for diverse stakeholders in the business environment. By effectively communicatingthesignificanceofyouranalysisandrecommendations,youwilldemonstrateyour abilitytobridgethegapbetweentechnicaljargonandthepracticalimplicationsofcybersecurityfor differentstakeholderswithinabusinesssetting.
LO1:Contextualisetheterminologyassociatedwithcybersecurityfordiverse stakeholders in business.
TECH2400 Introduction to Cyber Security Assessment 1 Help
Assessment Description Situation:
In the ever-evolvingandintricaterealmoftheinternet,characterisedbyanarrayofsophisticated threatsandtheconstantpresenceofcybercriminals,yourroleasacybersecurityprofessionaltakes onparamountsignificance.WiththenetworkprotocoltrafficWiresharkdumpfile,whichcaptured a pivotal event,your mission istometiculously examine itsintricacies. Your objective is to unravel the technical complexities inherent in this event, leaving no stone unturned. Armed with a comprehensive analysis, you will embark on the critical task of presenting your meticulously gatheredfindings,bridgingthegapbetweentechnicaljargonandthepracticalimplicationsof cybersecurity.Thisincludescontextualisingtheterminologyassociatedwithcybersecurityina mannerthatresonateswithdiversestakeholdersinthebusinesslandscape.Moreover,asan esteemedprofessionaloperatingatthehighestlevelofexpertise,youareexpectedtoengageina profounddiscourseonrobustdefensemechanisms.Bydoingso,youwillequiporganisationswith theknowledgeandstrategiesneededtofortifytheirdefensesagainstthisspecificformofattack.
Assessment Instructions
- Read thescenarioonthepreviouspage,tounderstandthecontextoftheevent.
- GotoMyKBSanddownloadtheWiresharkdumpfile(itwillbeintheformof
<student_ID>.pcap).
- Forexample,ifyourstudentIDis12345,the.pcapfilewillbe12345.pcap.
- AscoveredintheNetworkTrafficAnalysisworkshop,youmustdownloadandinstall Wireshark.
- Openyour.pcapfileusingWiresharktoperformtrafficanalysistoanswerthefollowing questions.
- Howmanypacketswerecaptured?
- WhatisthedestinationIPaddress?
- WhatistheChromeversionnumber?
- WhatistherequestURI?
- HowmanyTCPpacketswerecaptured?
- HowmanyHTTPpacketswerecaptured?
- WhatistherelativepercentageofHTTPpacketsthathavebeencaptured?
- Beforefinalisingandsubmittingyouranswers,headovertoMyKBStoprocessyourinputof the above questions, to receive real-time feedback, to ensure your answers are correct.
- Prepareandcreateyourpresentation,whichmustinclude5referencesandthefollowing slide headings:
- Introduction
- Introduceyourselfandthesubject.
- Background
- Provideabriefsummaryofthesituation.
- TrafficAnalysis
- Provideanswersandexplanationstotheabovequestions,alongsidethe Wireshark filters you used.
- IdentifiedAttack
- Discusswhichattackyoubelieveoccurredduringthisevent.
- DefenceProposal
- Proposeanddefendtwodefencesyoubelievewould mitigatetheriskofthe identified attack.
- Non-technicalExplanation
- Explainthesituation,identifiedattack,anddefenceproposaltoanaudienceof diverse stakeholders.
- Conclusion.
Important Study Information
Academic Integrity and Conduct Policy
https://www.kbs.edu.au/admissions/forms-and-policies
KBS values academic integrity.Allstudentsmustunderstandthemeaningandconsequencesofcheating, plagiarism and other academic offences under the Academic Integrity and Conduct Policy.
Please read the policy to lear nthe answers to the sequestions:
- Whatisacademicintegrityandmisconduct?
- Whatarethepenaltiesforacademicmisconduct?
- HowcanIappealmygrade?
Late submission of assignments(with in the Assessment Policy)
https://www.kbs.edu.au/admissions/forms-and-policies

Length Limits for Assessments
Penalties may be applied for assessment submissions that exceed prescribed limits.
Study Assistance
Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at https://elearning.kbs.edu.au/course/view.php?id=1481
Comments
Post a Comment