Assignment Task:

Task Details:

This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications. 

The assignment consists of two parts: 

Part A:

Use Nmap – a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment. 

Part B:

Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings. 

Case Study for the Assignment:

Canadian Cafe is a small business enterprise comprising franchise at different geographical locations with appropriate network facilities to reach their business requirements. A secure network across their geographical locations is one of the objectives of a business organization. The System and Network administrator of the organization realizes that the security of the network has to be addressed. it is necessary to impose certain level of filtering for the network to be secure and that is when it can sustain from attacks, which may damage the whole network. To develop a secure network, network administrators must have a good understanding of the attacks and appropriate mitigation techniques. It is necessary to identify the assets that need to be protected by performing a risk analysis, threats and vulnerabilities that the network may pose. After risk analysis, designing a set of security policies is very important to provide high level of security. 

The executive management of Canadian Cafe urges you to design the necessary security requirements. Looking into the requirements of the security and adhering to information security policy as a security team decides to configure firewall to secure the network from different types of possible threats and attacks that can harm the business network. 

Part A: Perform the following task. 

  1. Use Nmap from Kali on your Virtual Box 

  2. Write an introduction to include the description of the tool Features of Nmap:
    • Host discovery: useful for identifying hosts in any network
    • Port scanning: lets you enumerate open ports on the local or remote host
    • OS detection: useful for fetching operating system and hardware information about any connected device
    • App version detection: allows you to determine application name and version number
    • Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE)
     

  3. Demonstrate four tasks Nmap can perform. Discuss on how this tool can be used for mitigating differ types of threats. The discussion should include the name and brief description of the threat and must be supported by screenshots. 

  4. Discuss the performance of the tools based on the following: a. Security features and

  • b. Time taken to detect any threat 

  1. Perform the firewall testing using Nmap 

Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux. The list of commands is provided below: 

  1. Check the firewall status 

  2. Enable or disable the firewall accordingly 

  3. Allow services such as TCP, SSH and samba using their port number or name 

  4. Verify the firewall rules after adding the above services 

  5. Secure a web server by blocking HTTP service and allowing HTTPS service only 

  6. Allow a range of ports from 20 to 80 and deny a range of ports from 100 to 500 

  7. Verify the firewall rules 

  8. Allow HTTP from a specific subnet to access your web services

 

This Networking Assignment has been solved by our Networking Experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Eureka! You've stumped our genius minds (for now)! This exciting new question has our experts buzzing with curiosity. We can't wait to craft a fresh solution just for you!

  • Uploaded By : Alex Cerry
  • Posted on : April 22nd, 2019

Whatsapp Tap to ChatGet instant assistance