TECH2400 Introduction to Cyber Security Assessment 3 Help

 

TECH2400 Introduction to Cyber Security Assessment 3 Help

Assessment 3 Information

Subject Code:TECH2400

Subject Name:Introduction to Cyber Security

Assessment Title:Protocol Presentation and Evaluation

Assessment Type:Presentation and Evaluation

Word Count:10Minutes(+/-10%)

Weighting:40%

Total Marks:40

Submission:MyKBS :Week13

TECH2400 Introduction to Cyber Security Assessment 3 Help

Your Task

In TECH2400 Introduction to Cyber Security Assessment 3, you will undertake an individual task focused on conductinga comprehensive protocolanalysisusingWireshark.Yourobjectiveistothoroughlyexaminethenetworkprotocol trafficcapturedinthedumpfile,delvingintoitsvariousaspectstogainvaluableinsights.Building uponyour analysis, you will createacompelling presentation that not only highlights your findings but also establishes connections to the key concepts covered in class, showcasing your understandingoflearningoutcomeLO1.Thisassessmentservesasameanstoevaluateyour proficiency in network protocol analysis and your ability to apply this knowledge in practical scenarios.Additionally,itprovidesanexcellentopportunityforyoutodemonstrateyourskillsin analysingreal-worldnetworktrafficandeffectivelypresentingyourfindings.

Furthermore, this assessment requires you to defend your recommendations to diverse stakeholders,whichinvolvesarticulatingyourproposedstrategies,mitigations,andsolutionsina mannerthataddressestheconcernsandprioritiesofvariousstakeholders.Moreover,itexpects you to contextualise the terminology associated with cybersecurity in a way that is accessible and understandable for diverse stakeholders in the business environment. By effectively communicatingthesignificanceofyouranalysisandrecommendations,youwilldemonstrateyour abilitytobridgethegapbetweentechnicaljargonandthepracticalimplicationsofcybersecurityfor differentstakeholderswithinabusinesssetting.

LO1:Contextualisetheterminologyassociatedwithcybersecurityfordiverse stakeholders in business.

TECH2400 Introduction to Cyber Security Assessment 1 Help

Assessment Description Situation:

In the ever-evolvingandintricaterealmoftheinternet,characterisedbyanarrayofsophisticated threatsandtheconstantpresenceofcybercriminals,yourroleasacybersecurityprofessionaltakes onparamountsignificance.WiththenetworkprotocoltrafficWiresharkdumpfile,whichcaptured a pivotal event,your mission istometiculously examine itsintricacies. Your objective is to unravel the technical complexities inherent in this event, leaving no stone unturned. Armed with a comprehensive analysis, you will embark on the critical task of presenting your meticulously gatheredfindings,bridgingthegapbetweentechnicaljargonandthepracticalimplicationsof cybersecurity.Thisincludescontextualisingtheterminologyassociatedwithcybersecurityina mannerthatresonateswithdiversestakeholdersinthebusinesslandscape.Moreover,asan esteemedprofessionaloperatingatthehighestlevelofexpertise,youareexpectedtoengageina profounddiscourseonrobustdefensemechanisms.Bydoingso,youwillequiporganisationswith theknowledgeandstrategiesneededtofortifytheirdefensesagainstthisspecificformofattack.

Assessment Instructions

  1. Read thescenarioonthepreviouspage,tounderstandthecontextoftheevent.
  2. GotoMyKBSanddownloadtheWiresharkdumpfile(itwillbeintheformof

<student_ID>.pcap).

  1. Forexample,ifyourstudentIDis12345,the.pcapfilewillbe12345.pcap.
  2. AscoveredintheNetworkTrafficAnalysisworkshop,youmustdownloadandinstall Wireshark.
  3. Openyour.pcapfileusingWiresharktoperformtrafficanalysistoanswerthefollowing questions.
  4. Howmanypacketswerecaptured?
  5. WhatisthedestinationIPaddress?
  6. WhatistheChromeversionnumber?
  7. WhatistherequestURI?
  8. HowmanyTCPpacketswerecaptured?
  9. HowmanyHTTPpacketswerecaptured?
  10. WhatistherelativepercentageofHTTPpacketsthathavebeencaptured?
  11. Beforefinalisingandsubmittingyouranswers,headovertoMyKBStoprocessyourinputof the above questions, to receive real-time feedback, to ensure your answers are correct.
  12. Prepareandcreateyourpresentation,whichmustinclude5referencesandthefollowing slide headings:
  13. Introduction
  14. Introduceyourselfandthesubject.
  15. Background
  16. Provideabriefsummaryofthesituation.
  17. TrafficAnalysis
  18. Provideanswersandexplanationstotheabovequestions,alongsidethe Wireshark filters you used.
  19. IdentifiedAttack
  20. Discusswhichattackyoubelieveoccurredduringthisevent.
  21. DefenceProposal
  22. Proposeanddefendtwodefencesyoubelievewould mitigatetheriskofthe identified attack.
  23. Non-technicalExplanation
  24. Explainthesituation,identifiedattack,anddefenceproposaltoanaudienceof diverse stakeholders.
  25. Conclusion.

Important Study Information

Academic Integrity and Conduct Policy

https://www.kbs.edu.au/admissions/forms-and-policies

KBS values academic integrity.Allstudentsmustunderstandthemeaningandconsequencesofcheating, plagiarism and other academic offences under the Academic Integrity and Conduct Policy.

Please read the policy to lear nthe answers to the sequestions:

  • Whatisacademicintegrityandmisconduct?
  • Whatarethepenaltiesforacademicmisconduct?
  • HowcanIappealmygrade?

Late submission of assignments(with in the Assessment Policy)

https://www.kbs.edu.au/admissions/forms-and-policies

Length Limits for Assessments

Penalties may be applied for assessment submissions that exceed prescribed limits.

Study Assistance

Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at https://elearning.kbs.edu.au/course/view.php?id=1481

Comments

Popular posts from this blog

8 Awesome Assignment Writing Tips to Get Better Marks!

Step-by-Step Guide to Submit Assignments on SISTC Moodle

Top-Quality Assignment Help in Australia — Your Academic Success Partner