Country : | India |
---|
Task
For this assignment, you are to assume the role of a cyber security consultant who has been hired by a small training company. The company has provided you with a copy of their virtual server and would like you undertake the following tasks:
1) Identify four security issues with the virtual server.
2) Fix two of these security issues and validate the fixes.
3) Install and configure a secure SSH server that fulfils the company’s requirements given later in this specification.
Learning Outcomes to be assessed
1) Apply wide-ranging technical and conceptual skills to the task of securing new and existing systems.
2) Demonstrate the ability to apply practical configuration, diagnostic and problem solving skills to real-world scenarios.
Detail of the task
This is an individual assignment designed to evaluate YOUR knowledge. Copying pre-existing configuration files (partial or complete), reports or testing plans from other sources is prohibited. You must develop the contents yourself, based on what you have learned.
Task 1 - Virtual server security audit
Using any selection of tools that you deem appropriate, you are to perform a detailed inspection the current server setup and identify four security issues (TCP timestamp-related issues are NOT acceptable).
For each issue you MUST:
Task 2 - Virtual server security repair Selecting any two of the security issues previously identified, you are required to implement permanent fixes on the provided VM.
Each fix MUST:
Task 3 - Implement a secure SSH server
You are tasked with installing and configuring OpenSSH on the provided VM. Your implementation must conform to the company’s requirements given below. You will need to interpret these and devise a suitable configuration for the server. If you find any element ambiguous, it is up to you to select the configuration you feel is most appropriate for the company’s needs.
SSH requirements provided by the company:
You must provide the sshd_config file as part of your submission, which will be tested on the VM provided. Remember, your configuration files must be commented to explain changes where any default values have been changed and why.
What you should hand in
You must submit the following items to Canvas in a single ZIP archive file:
This IT Computer Science Assignment has been solved by our IT Computer Science Expert at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered.
You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.