Network Management Security Questions

 

Practical

In this practical, you will fill out a Chain of custody form *find sample form attached to this question*for a given set of devices and a given set of events. Fill out the form as best as you are able given the circumstances. Best practices will be discussed during the week.

Complete the provided Chain of Custody Form, complete with dates and times, signatures (you can fill out the form in Word and write //SIGNED BY TOM// (replace Tom by the appropriate person) and identifying information. Turn the completed Chain of Custody form in through Canvas. Ask your instructor if you have questions.

Information for the Chain of Custody Form:

Timeline of Events:

  • •On Wednesday, February 11, 2015, at 10:19 AM, you received the computer in Image 1 via a FedEx carrier, tracking number 800053991099, for analysis
  • •That afternoon, you removed the hard drive in Image 2 and obtained a forensic image.
  •  
  • •On Friday, February 13, 2015, at 1:00 PM, Tim Young, Director of IT for the client, came to your office and turned over the USB flash drive in Image 3 to you for analysis.
  •  
  • •After your analysis was complete and at the request of the client, you turned over the original hard drive in Image 2 to Special Agent Brent Cline of the FBI for analysis and criminal prosecution.

In assignment 1, you have successfully implemented the network on eNSP (or Packet
Tracer but this may be more complex if you choose to continue with Packet Tracer) and
performed important steps to manage the network configuration. In this assignment, you
will perform necessary setup to manage the network performance. In particular, you will
complete the following tasks:
• Task 1: Select a suitable network management architecture to manage the network
then implement the architecture using Zabbix NMS and SNMPv2c.
• Task 2: Document performance baselining for the network connectivity.
• Task 3: A staff member at the branch network reports that she cannot upload
documents to a shared folder of the headquarter network document server. Outline
the troubleshooting steps you would use to solve this issue.

use the vigenere cipher with keyword ‘health’ to encipher the message “life is full of surprises”. please give me the answer.

Security Awareness Training Program

Employee training in security normally is a one-time or annual event. It has been proven that security awareness can be reinforced through the use of posters placed in strategic locations.

1. Research any computer security threat or a recent attack. Select one element of the threat or attack (e.g., “Clean Desk”).

2. Design a Security Awareness Training Poster that is simple and compelling (e.g., the WWII poster “Loose Lips Sink Ships”).

3. Include how to empower trainees to analyze cybersecurity theories and practices in the light of God’s revealed truth and apply professional, ethical, and responsible behaviours to tangible security situations from a Christian worldview.

4. It should be no longer than 500 words

5. Include at least two references

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Disaster Recovery Plan

There are threats all around us, so it is essential to have a robust plan in place to help mitigate the damage to a business from these threats.

1. Select any one of the threats that have been covered in the Business Continuity Chapter of the text and develop a Disaster Recovery Plan (DRP).

2. The plan at a minimum should include a summary of the threat, a risk assessment, a mitigation strategy, how you will restore the IT resource, and contingencies.

3. The DRP should be no longer than 500-750 words.

Prepare this assignment according to the guidelines found in the APA Style Guide.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to Lopes Write.

In assignment 1, you have successfully implemented the network on eNSP (or Packet
Tracer but this may be more complex if you choose to continue with Packet Tracer) and
performed important steps to manage the network configuration. In this assignment, you
will perform necessary setup to manage the network performance. In particular, you will
complete the following tasks:
• Task 1: Select a suitable network management architecture to manage the network
then implement the architecture using Zabbix NMS and SNMPv2c.
• Task 2: Document performance baselining for the network connectivity.
• Task 3: A staff member at the branch network reports that she cannot upload
documents to a shared folder of the headquarter network document server. Outline
the troubleshooting steps you would use to solve this issue.

Outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Group’s systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrook’s systems. As you are developing the Scanning Plan, keep these questions in mind: • How would you detect active systems? • How would you determine the best attack vector you wish to exploit? • How would you prioritize different targets of opportunity? • What tools would you be using for scanning and enumeration of systems and vulnerabilities? Be sure to identify any needed software and provide a description of how it will be used to gather information about the systems. Use the Reconnaissance and Scanning plans template from last week to finish your deliverable.

his assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.

Answers MUST be written in your own words. No marks will be awarded for any answer that contains more than 10% direct quote (referenced or unreferenced). One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12-point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1 [4 Marks]

Complete the Hands-On Projects 3-1 and 3-2 from the prescribed textbook (pg. 144-145). The files required to complete these projects are available from the “resources” folder in the subject site. In order to complete these activities, students should insert screenshots in the assignment document along with a brief informative description of each step taken to complete the project. Marks will be deducted if the description is not provided.

Question 2 [6 Marks]

Watch the following two videos and write a reflective piece based on your observations and insights on the workings of both Link State and Distance Vector Routing, highlighting the major differences. In addition to the videos, students are encouraged to consult authentic additional resources such as text book, research articles etc. to enhance understanding of the topics.

Further information on reflective writing is available from here

Question 3 Case study task [8 Marks]

Let us consider three hosts connected together in a local network having private IP addresses 10.0.1.14, 10.0.1.15 and 10.0.1.20. Between this local network of three hosts and the rest of the internet is a NAT enabled switch/router as shown in Figure1 below. All information in the form of IP datagrams being sent from or incoming towards these hosts must pass through this device.

Figure 1: Network Diagram

Task 1 - 4 Marks

Figure 1 above shows a switched network, with Host A, B and C connected to ports Fa0/1, Fa0/2 and Fa0/3 respectively; the current MAC address table of Switch-1 is empty as below:

Mac AddressPort Number

a) Discuss what would happen next if Switch-1 received a frame from Host-A with the destination MAC address of host-B?

b) Discuss what would happen next if Switch-1 received a frame from Host-B with the destination MAC address of host-A?

In both cases, illustrate the changes in the MAC address table in your answer.

Task 2 - 4 Marks

Let us assume that the host with IP address 10.0.1.20 sends an IP data-gram destined to host 128.119.165.183. The source port is randomly selected as 3428, and the destination port as 80.

What are the source and destination address of the IP datagram as well as the source and destination port numbers for the TCP segment in the datagram at?

a) step one (i.e. after it has been sent from the host but before it reaches the router).

b) step two? (i.e. after it has been transmitted from the router).

c) step three (just before it is received by the router)

d) step four (after it has been transmitted by the router but before it is received by the host).

You may complete the following table and submit for Task 2. Each correct entry would attract 0.25 marks (i.e. for all 16 correct answers, one would receive 16 x 0.25 = 4 marks)

StepSource AddressDestination AddressSource Port numberDestination Port Number
1
2
3
4