合肥生活安徽新闻合肥交通合肥房产生活服务合肥教育合肥招聘合肥旅游文化艺术合肥美食合肥地图合肥社保合肥医院企业服务合肥法律

代写COMP07075 Security Fundamentals 网络攻击程序 
代写COMP07075 Security Fundamentals 网络攻击程序 

时间:2025-10-27  来源:合肥网hfw.cc  作者:hfw.cc 我要纠错



Scanning, Reconnaissance and Vulnerability Assessment
Coursework 1: Part A
Course: COMP07075 Security Fundamentals

Subject: Important Note for Coursework Submission
Dear Students,
Please ensure that all snapshots provided as outputs display your Student ID and Name (only in Englih) on the terminal/Operating System GUI. This is necessary for verifying the authenticity of your work.
To do this, you can create a new username (your name or Banner ID) in Kali/Ubuntu Linux so that it appears on the terminal while running your commands.
Failure to comply with this requirement may impact your score, as it will be difficult to confirm whether you have performed the experiments yourself.
Thank you for your cooperation! Babak 
Subject: Important Note on AI Tool Usage and Academic Integrity
Dear Students,
Please do not use ChatGPT or any other generative AI tools to produce your solution. Any detected use of AI-generated content will result in your case being forwarded to the Academic Integrity Committee.
Plagiarism is a serious offense, and it is essential to ensure that all submitted work is your own. Please adhere to academic integrity guidelines to avoid any penalties.
If you have any questions or need clarification, feel free to reach out.
Best regards, Babak
Task 01: List the various common threats to your IT/Network infrastructure against each component/device.  (Marks assigned 10). 

Task 02: Demonstrate the TCP three-way handshake using Wireshark. (Marks assigned: 18)
1.In your Kali VM, capture the network traffic using the Wireshark tool. Open a website and generate website traffic. 
2.Using captured traffic, explain DNS, TCP-Three-way handshake and HTTP GET/POST methods. 
3.Explain how the TCP three-way handshake can be used to carry out a DoS attack and how to stop that attack. 
4.Provide proper evidence in the form of screenshots and an explanation. 
Task 03: Vulnerability Assessment of the target machine (Marks assigned 10)
5.Create a network of Metasploit VM and Kali Linux. The network should have IP addresses from network ID 192.168.2.0/24. 
6.Use a scanning tool like nmap and list all the vulnerable/open ports of your target machine. Provide an output snapshot with a caption. 
7.Discuss the top 5 open ports and their associated vulnerabilities. For example, if you see port 80 open, what can be vulnerabilities a target machine can face if port 80 is open? Provide a brief explanation for each opened port.
Task 04: Security Policies (Marks assigned 12)
1.Discuss how security policies and cyber security essential training can mitigate the risk of cyber-attacks on a company.
2.Consider yourself as a Cyber Security Analyst of a company, list the most important points of various cyber security policies that are helpful in mitigating the risk of cyber-attacks and why?  
请加QQ:99515681  邮箱:99515681@qq.com   WX:codinghelp

扫一扫在手机打开当前页
  • 上一篇:代写COMP3811 C++ Computer Graphics 程序 编程
  • 下一篇:2025年10月份更新拼多多改销助手小象助手多多出评软件
  • 无相关信息
    合肥生活资讯

    合肥图文信息
    2025年10月份更新拼多多改销助手小象助手多多出评软件
    2025年10月份更新拼多多改销助手小象助手多
    有限元分析 CAE仿真分析服务-企业/产品研发/客户要求/设计优化
    有限元分析 CAE仿真分析服务-企业/产品研发
    急寻热仿真分析?代做热仿真服务+热设计优化
    急寻热仿真分析?代做热仿真服务+热设计优化
    出评 开团工具
    出评 开团工具
    挖掘机滤芯提升发动机性能
    挖掘机滤芯提升发动机性能
    海信罗马假日洗衣机亮相AWE  复古美学与现代科技完美结合
    海信罗马假日洗衣机亮相AWE 复古美学与现代
    合肥机场巴士4号线
    合肥机场巴士4号线
    合肥机场巴士3号线
    合肥机场巴士3号线
  • 短信验证码 雷神诗词网 币安下载 目录网

    关于我们 | 打赏支持 | 广告服务 | 联系我们 | 网站地图 | 免责声明 | 帮助中心 | 友情链接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥网 版权所有
    ICP备06013414号-3 公安备 42010502001045