1. Engineering
  2. Computer Science
  3. descriptionyou are required to work in a group of two...

Question: descriptionyou are required to work in a group of two...

Question details

Description:You are required to work in a group of two. Teams will be formed when project is given, and if it doesnt work out with your team member you are responsible to work on the project individually. You should work on this project outside of the class time. If graduate students dont develop new network and security tools they will only get 50% of the grade basically they will fail this project. Objectives Part 1. Network Attacks Develop a security tool to be used to identify host or network device vulnerabilities Part 2: Security Tools Find an existing tool to be used to identify host or network device vulnerabilities. Investigate on security tools that have happened in the past and answer the questions below You need to do live demonstrations and PowerPoint on how your network attack can occur and how security tool can prevented it. Background Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the years to attack and compromise the networks of organizations. These attacks take many forms, but in most cases, they seek to obtain sensitive information, destroy resources, or deny legitimate users access to resources. To understand how to defend a network against attacks, an administrator must first identify network vulnerabilities. Specialized security software developed by equipment and software manufacturers can be used to help identify potential weaknesses. In addition, the same tools used by attackers can be used to test the ability of a network to mitigate an attack. After the vulnerabilities are known, steps can be taken to help mitigate the network attacks. This lab provides a structured research project that is divided into two parts: Investigating Network Attacks and Investigating Security Tools. You can elect to perform both Part 1 and Part 2 In Part 1, you research various network attacks that have actually occurred. Describe how the attack was perpetrated and how extensive the network outage or damage was. You also investigate how the attack could have been mitigated or what mitigation techniques might have been implemented to prevent future attacks. In Part 2, you research security tools and investigate one that can be used to identify host or network device vulnerabilities. Part 1. Investigating Network Attacks In Part 1 of this lab, you research various network attacks that have actually occurred and select three network attacks to write a report on. Also, graduate students need to develop tool to do network attack using Java, C++, or any other programming language you know. Step 1: Research various network attacks List the attacks you identified in your search. (Information must be included: Name of attack, type of attack, dates of attacks, computers /organizations affected, how it works and what it did, and mitigation options)
Solution by an expert tutor
Blurred Solution
This question has been solved
Subscribe to see this solution