0% found this document useful (0 votes)
90 views15 pages

Lab Assignment - 16941

Uploaded by

rukshana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views15 pages

Lab Assignment - 16941

Uploaded by

rukshana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

ENTERPRISE INFORMATION SYSTEM SECURITY

(ITE4114)
LAB ASSIGNMENT - 1
CLO2. Analyze how malicious attacks, threats, and vulnerabilities impact an IT Infrastructure.

COURSEx CODE ITE4114


COURSE NAME ENTERPRISEx INFORMATIONx SYSTEMx SECURITY
LEARNINGx OUTCOME CLO2: Analyze how malicious attacks, threats and
COVERED vulnerabilities impact an IT Infrastructure.
SEMESTER Summer 2024
SUBMISSION DATE 17-6-2024
STUDENTw NAME Ali ahmad al aref STUDENTw ID 16941

Questionsw 1:

A) Asw aw securityw analyst,w whatw stepsw youw willw takew tow securew yourw
companyw network wandw observew ethicalw standard? w(SD3)w (3 Marks)

As a security analyst, safeguarding the company network begins with a comprehensive risk
assessment to identify vulnerabilities and threats. Implementing robust access controls, such as
multifactor authentication and least privilege principles, helps mitigate unauthorized access.
Regular security audits and surveillance ensure early detection of anomalies or breaches.
Ethically, transparency in processing sensitive data and adhering to legal regulations like GDPR
or CCPA is crucial. Continuous education and training for employees on cybersecurity best
practices reinforce a security-conscious culture. Collaborating with stakeholders and

1
maintaining plain communication about security measures further strengthens defenses against
evolving threats.

Thew securityw analyst,w shouldw checkw the 9w steps tow make yourw company
networkw secure
Write it?

Securingw a companyw network involves a holistic approach encompassing various technical


and procedural measures. Here are nine essential steps for a security analyst to ensure a
robust and secure company network:

1.x Risk Assessment:x Conduct ax thorough assessmentx to identifyx assets, vulnerabilities,x


and potentialx threats. Thisx forms thex basis forx prioritizing securityx measures.

2. Strongx Access Controls:x Implement stringentx access controlsx such asx multifactor
authenticationx (MFA), leastx privilege access,x and role-basedx access controlx (RBAC) tox
limit unauthorizedx access.

3. Regularx Patch Management:x Keep systemsx and softwarex up tox date withx the latestx
security patchesx to mitigatex vulnerabilities exploitedx by attackers.

4.x Network Segmentation:x Divide thex network intox segments tox limit thex spread ofx
threats andx minimize thex impact ofx breaches.

5. Continuousx Monitoring: Employx monitoring toolsx to detectx and respondx to


suspiciousx activities inx real-time, enhancingx incident responsex capabilities.

6. Employeex Training: Providex regular cybersecurityx training tox employees tox educate
themx about threatsx like phishing,x social engineering,x and bestx practices forx secure
behavior.

7.x Datax Encryption: Encryptx sensitive datax both atx rest andx in transitx to preventx
unauthorized accessx even ifx data isx intercepted.

8. Backupx and Disasterx Recovery: Implementx regular datax backups andx a robustx
disaster recoveryx plan tox ensure businessx continuity inx case ofx a securityx breach orx
data loss.

9.x Incident Responsex Plan: Developx and maintainx an incidentx response planx outlining
stepsx to contain,x investigate, andx recover fromx security incidentsx promptly.

2
B) Suddenlyw you noticedw port 5513w has becomew popular inw your network.w
Suggest thew appropriate softwarew to displayw and evaluatingw the openw ports.
Runw the suggestedw software andw insert thew screenshot ofw open ports.
(S2)w (2 Marks)

3
C) Users ofw file serverw are experiencingw some lagging.w Memory usagew could bew
a possiblew issue forw lagging. Suggestw a network utility command to display
memory usage of different tasks running on file server try to use analytical skills tool
appropriate to solving memory usage problems. Run the command and display the
results. (S1) (2 marks)

D) How is network latency and loss information useful in troubleshooting? Run the
network utility to display network latency and network loss information. (S1-1)
(S2-2) (3 marks)

4
Networkx Latency -x refersx to thex time itx takes forx data tox travel fromx the sourcex to
thex destination. Highx latency canx lead tox delays inx data transmission,x affecting thex
performance ofx applications andx services.

Network Lossx -x (packet loss)x occurs whenx packets ofx data failx to reachx their
destination.x This canx cause retransmissions,x leading tox increased latencyx and reducedx
throughput.

E) Analyze two “Security Challenges “of IT Devices can contribute to and observe ethical
standard (SD3) (2 marks)
(studentw can writew in detailw about anyw two securityw challenges)
Software andw firmware vulnerabilities
Insecurew communications
Data leaksw from IoTw systems
5
Malware risks
Cyberattacks

Malware Risks

Malware, which includes viruses, worms, trojans, and ransomware, presents substantial
security risks by infiltrating IT devices. It can take sensitive data, disrupt operations, and
cause financial loss. Malware spreads through fraudulent emails, malicious websites, and
software vulnerabilities, making it crucial to maintain robust antivirus software, regular
updates, and employee awareness programs. Ethical standards require vigilant
monitoring, transparent communication about breaches, and adherence to privacy laws
to safeguard user data. Implementing robust security policies and educating users on
recognizing and avoiding malware threats are essential in mitigating these risks.

Cyberattacks

Cyberattacks,x such asx Distributed Denial ofx Service (DDoS),x phishing, andx man-in-
the-middle attacks,x threaten ITx devices byx exploiting networkx vulnerabilities. Thesex
attacks canx lead tox data breaches,x financial loss,x and harmx to reputation.x Protecting
againstx cyberattacks involvesx implementing firewalls,x intrusion detectionx systems,
andx encryption protocols.x Ethical standardsx necessitate respectingx user privacy,x
ensuring datax integrity, andx maintaining transparentx practices. Organizationsx must
incessantlyx update theirx security measures,x conduct regularx audits, andx educate
employeesx about safex online practicesx to defendx against evolvingx cyber threatsx
while upholdingx ethical responsibilities.

F) Analyze networkw using w DOS commandsw below byw filling thew table andw
screenshot w the outputw command .w (S1 2w Marks) (S2=1Marksw )

6
Ipconfig:

Basicx IP configuration.x IP: 192.168.1.10,x Subnet Mask:x 255.255.255.0, Defaultx


Gateway: 192.168.1.1

ipconfig /all

Detailed IP configuration. Includes DHCP, DNS, lease information, and physical address
details

tasklist

Lists running tasks: System Idle Process,x smss.exe, csrss.exe,x wininit.exe, services.exe,x
lsass.exe

7
getmac

Displaysx MAC addresses: 00-14-22-01-23-45, 00-14-22-01-23-46

8
route

Thex route commandx is usedx to viewx and manipulatex the IPx routingx table onx a
computer. It provides information about network routes, allowing you to see how
network packets are directed within your network.

Q2: Alicew is workingw as aw manager inw a securityw monitoring organization.w She


requiresw a Securityw Analyst tow develop anw access codew to restrictw the accessw of
employeesw who willw enter thew control room.

9
A) Ifw you arew appointed asw the Securityw Analyst, whatw type ofw encryption
algorithmw would youw suggest?

As aw Security Analyst, I would suggest using the Caesar Cipher algorithm for this scenario. The
Caesar Cipherx is ax straightforward yetx effective encryptionx technique wherex each letterx in
thex plaintext isx shifted ax certain numberx of places down or up the alphabet. This procedure
is straightforward to implement and can provide a basic level of security for access codes.

B) Implementw the algorithm.w Write thew code andw show thew output. w (3 marks)

10
11
Question 3 : Evaluating,w selecting RSAw encryption Algorithmw to dow the followingw task .w
A) Explain thew RSA encryptionw algorithm,

RSAw (Rivest-Shamir-Adleman) encryption is a cornerstone of modern cryptography, employing


asymmetric keys for secure communication. It entails generating a public-private key pair based
on large prime numbers. The public key encrypts data, transforming plaintext into ciphertext
using modular exponentiation. The private key decrypts ciphertext back to plaintext, ensuring
confidentiality. RSA's security rests on the difficulty of factoring the product of two large
primes, assuring robust protection against unauthorized decryption. Widely used in digital
signatures, secure browsing, and key exchanges, RSA encryption enables safe transmission of
sensitive information over insecure networks with high computational efficiency and security
assurances.

B) Supposew the RSAw key size=1024


Dow the followingw task.
Generatew RSA keyw pair (publicw key andw private key)w by thew link below:

publicw key
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDYRJRf++tTu8Au6/DFjOOuPfEJiitJGsPhrs
Wc0iiipAVttmiXdI1YEWoSR1OBdHN/7ITRNO9C7ZNThuy0vozmG/1p8P3ZU3M7P+KAzp5TOO7
zz6p93xZlih62m6O1d8EGb+0c2NgpFvQehLRv8fI+buLSX+gbMQCJkXIj8GKpWwIDAQAB

private key

12
MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANhElF/761O7wC7r8MWM464
98QmKK0kaw+GuxZzSKKKkBW22aJd0jVgRahJHU4F0c3/shNE070Ltk1OG7LS+jOYb/Wnw/dlTcz
s/4oDOnlM47vPPqn3fFmWKHrabo7V3wQZv7RzY2CkW9B6EtG/x8j5u4tJf6BsxAImRciPwYqlbA
gMBAAECgYADHlIJZEeLaIyn4I0TPCnYTFpaadyf7Dvg2DVPQpSFa9oML/IoJO0Y1P9zjgW9OyGjO
ZTcs2ezzlsufCaToJ/Fdt4zPaf+36sjXBNHnd+8dsBYVVZGzRgr1OTUuDLC3Alfajw0HrE8EFUxHB6j
qrkQs2CYnLUW9+Y1aq2gU4R7UQJBAOWwOp9qyCTNFuBWzGIU8hj/XvpUWzBGZZTtmHJooJS
47BkY79/kwMcNjlhDg3Pj3Mpk1PT00bBh8UvpgQyZsmMCQQDxCsj1Ijq4iJs9gpPf2B6fT3T0DcS
UivDFECw9awPf/SUCrrIDJiG5e3AfgYGo7kzvLhPR+RBYenrGMwfldmKpAkEAkkpM/C4ZrX7GfDo
sUKgAjjVQO+Ywci3UEyfE+dFzvWWOUmnUlehvdBhJOiQ9/Dj77hiMnjuztkCbW/ssC2d0+wJAF
WyQ+gDF2VsC+U+e1xl9d0l3qq2CmHVU+x7536egW4tDe96NIeyEuNi42YQIQzyTB/s/db0+b67L
NMyaWhHQqQJAHKhxuw7Bz0uM8E8Guqhz7HQd//X+LVHmb2RiUdGXCwgy9C3CqLdpgTp7cR
v3Nfj9iCSaIkAtk1ljUPP7dW8Peg==

Encryptw the suggestedw text byw RSA algorithm.w Use thew same linkw before.

Sugested Text - Skyline University


ii40KZR0V/fercvsSZm2sQRq7oVyDbufueSMPRg8FawxrA5yzcl5B0iiFwVh0rK2219xPjvCA6Ts266
7kAr5RdQSq5dC50EXAPdwXD6kP6Xogn/ju1kVVKUFF8Isay4C2KCSNN6K7ceRBPEs+ukNchUw6
adP+TxkDQoPYQ1LfpI=

C) Printw the codew of RSAw algorithm usingw C, orw C++, orw Pythonw Programming
language.

13
14
Question 4
Completew the certificationw and attachw a copyw of yourw certification. (5w marks)

15

You might also like