Lab Assignment - 16941
Lab Assignment - 16941
(ITE4114)
LAB ASSIGNMENT - 1
CLO2. Analyze how malicious attacks, threats, and vulnerabilities impact an IT Infrastructure.
Questionsw 1:
A) Asw aw securityw analyst,w whatw stepsw youw willw takew tow securew yourw
companyw network wandw observew ethicalw standard? w(SD3)w (3 Marks)
As a security analyst, safeguarding the company network begins with a comprehensive risk
assessment to identify vulnerabilities and threats. Implementing robust access controls, such as
multifactor authentication and least privilege principles, helps mitigate unauthorized access.
Regular security audits and surveillance ensure early detection of anomalies or breaches.
Ethically, transparency in processing sensitive data and adhering to legal regulations like GDPR
or CCPA is crucial. Continuous education and training for employees on cybersecurity best
practices reinforce a security-conscious culture. Collaborating with stakeholders and
1
maintaining plain communication about security measures further strengthens defenses against
evolving threats.
Thew securityw analyst,w shouldw checkw the 9w steps tow make yourw company
networkw secure
Write it?
2. Strongx Access Controls:x Implement stringentx access controlsx such asx multifactor
authenticationx (MFA), leastx privilege access,x and role-basedx access controlx (RBAC) tox
limit unauthorizedx access.
3. Regularx Patch Management:x Keep systemsx and softwarex up tox date withx the latestx
security patchesx to mitigatex vulnerabilities exploitedx by attackers.
4.x Network Segmentation:x Divide thex network intox segments tox limit thex spread ofx
threats andx minimize thex impact ofx breaches.
6. Employeex Training: Providex regular cybersecurityx training tox employees tox educate
themx about threatsx like phishing,x social engineering,x and bestx practices forx secure
behavior.
7.x Datax Encryption: Encryptx sensitive datax both atx rest andx in transitx to preventx
unauthorized accessx even ifx data isx intercepted.
8. Backupx and Disasterx Recovery: Implementx regular datax backups andx a robustx
disaster recoveryx plan tox ensure businessx continuity inx case ofx a securityx breach orx
data loss.
9.x Incident Responsex Plan: Developx and maintainx an incidentx response planx outlining
stepsx to contain,x investigate, andx recover fromx security incidentsx promptly.
2
B) Suddenlyw you noticedw port 5513w has becomew popular inw your network.w
Suggest thew appropriate softwarew to displayw and evaluatingw the openw ports.
Runw the suggestedw software andw insert thew screenshot ofw open ports.
(S2)w (2 Marks)
3
C) Users ofw file serverw are experiencingw some lagging.w Memory usagew could bew
a possiblew issue forw lagging. Suggestw a network utility command to display
memory usage of different tasks running on file server try to use analytical skills tool
appropriate to solving memory usage problems. Run the command and display the
results. (S1) (2 marks)
D) How is network latency and loss information useful in troubleshooting? Run the
network utility to display network latency and network loss information. (S1-1)
(S2-2) (3 marks)
4
Networkx Latency -x refersx to thex time itx takes forx data tox travel fromx the sourcex to
thex destination. Highx latency canx lead tox delays inx data transmission,x affecting thex
performance ofx applications andx services.
Network Lossx -x (packet loss)x occurs whenx packets ofx data failx to reachx their
destination.x This canx cause retransmissions,x leading tox increased latencyx and reducedx
throughput.
E) Analyze two “Security Challenges “of IT Devices can contribute to and observe ethical
standard (SD3) (2 marks)
(studentw can writew in detailw about anyw two securityw challenges)
Software andw firmware vulnerabilities
Insecurew communications
Data leaksw from IoTw systems
5
Malware risks
Cyberattacks
Malware Risks
Malware, which includes viruses, worms, trojans, and ransomware, presents substantial
security risks by infiltrating IT devices. It can take sensitive data, disrupt operations, and
cause financial loss. Malware spreads through fraudulent emails, malicious websites, and
software vulnerabilities, making it crucial to maintain robust antivirus software, regular
updates, and employee awareness programs. Ethical standards require vigilant
monitoring, transparent communication about breaches, and adherence to privacy laws
to safeguard user data. Implementing robust security policies and educating users on
recognizing and avoiding malware threats are essential in mitigating these risks.
Cyberattacks
Cyberattacks,x such asx Distributed Denial ofx Service (DDoS),x phishing, andx man-in-
the-middle attacks,x threaten ITx devices byx exploiting networkx vulnerabilities. Thesex
attacks canx lead tox data breaches,x financial loss,x and harmx to reputation.x Protecting
againstx cyberattacks involvesx implementing firewalls,x intrusion detectionx systems,
andx encryption protocols.x Ethical standardsx necessitate respectingx user privacy,x
ensuring datax integrity, andx maintaining transparentx practices. Organizationsx must
incessantlyx update theirx security measures,x conduct regularx audits, andx educate
employeesx about safex online practicesx to defendx against evolvingx cyber threatsx
while upholdingx ethical responsibilities.
F) Analyze networkw using w DOS commandsw below byw filling thew table andw
screenshot w the outputw command .w (S1 2w Marks) (S2=1Marksw )
6
Ipconfig:
ipconfig /all
Detailed IP configuration. Includes DHCP, DNS, lease information, and physical address
details
tasklist
Lists running tasks: System Idle Process,x smss.exe, csrss.exe,x wininit.exe, services.exe,x
lsass.exe
7
getmac
8
route
Thex route commandx is usedx to viewx and manipulatex the IPx routingx table onx a
computer. It provides information about network routes, allowing you to see how
network packets are directed within your network.
9
A) Ifw you arew appointed asw the Securityw Analyst, whatw type ofw encryption
algorithmw would youw suggest?
As aw Security Analyst, I would suggest using the Caesar Cipher algorithm for this scenario. The
Caesar Cipherx is ax straightforward yetx effective encryptionx technique wherex each letterx in
thex plaintext isx shifted ax certain numberx of places down or up the alphabet. This procedure
is straightforward to implement and can provide a basic level of security for access codes.
B) Implementw the algorithm.w Write thew code andw show thew output. w (3 marks)
10
11
Question 3 : Evaluating,w selecting RSAw encryption Algorithmw to dow the followingw task .w
A) Explain thew RSA encryptionw algorithm,
publicw key
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDYRJRf++tTu8Au6/DFjOOuPfEJiitJGsPhrs
Wc0iiipAVttmiXdI1YEWoSR1OBdHN/7ITRNO9C7ZNThuy0vozmG/1p8P3ZU3M7P+KAzp5TOO7
zz6p93xZlih62m6O1d8EGb+0c2NgpFvQehLRv8fI+buLSX+gbMQCJkXIj8GKpWwIDAQAB
private key
12
MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBANhElF/761O7wC7r8MWM464
98QmKK0kaw+GuxZzSKKKkBW22aJd0jVgRahJHU4F0c3/shNE070Ltk1OG7LS+jOYb/Wnw/dlTcz
s/4oDOnlM47vPPqn3fFmWKHrabo7V3wQZv7RzY2CkW9B6EtG/x8j5u4tJf6BsxAImRciPwYqlbA
gMBAAECgYADHlIJZEeLaIyn4I0TPCnYTFpaadyf7Dvg2DVPQpSFa9oML/IoJO0Y1P9zjgW9OyGjO
ZTcs2ezzlsufCaToJ/Fdt4zPaf+36sjXBNHnd+8dsBYVVZGzRgr1OTUuDLC3Alfajw0HrE8EFUxHB6j
qrkQs2CYnLUW9+Y1aq2gU4R7UQJBAOWwOp9qyCTNFuBWzGIU8hj/XvpUWzBGZZTtmHJooJS
47BkY79/kwMcNjlhDg3Pj3Mpk1PT00bBh8UvpgQyZsmMCQQDxCsj1Ijq4iJs9gpPf2B6fT3T0DcS
UivDFECw9awPf/SUCrrIDJiG5e3AfgYGo7kzvLhPR+RBYenrGMwfldmKpAkEAkkpM/C4ZrX7GfDo
sUKgAjjVQO+Ywci3UEyfE+dFzvWWOUmnUlehvdBhJOiQ9/Dj77hiMnjuztkCbW/ssC2d0+wJAF
WyQ+gDF2VsC+U+e1xl9d0l3qq2CmHVU+x7536egW4tDe96NIeyEuNi42YQIQzyTB/s/db0+b67L
NMyaWhHQqQJAHKhxuw7Bz0uM8E8Guqhz7HQd//X+LVHmb2RiUdGXCwgy9C3CqLdpgTp7cR
v3Nfj9iCSaIkAtk1ljUPP7dW8Peg==
Encryptw the suggestedw text byw RSA algorithm.w Use thew same linkw before.
C) Printw the codew of RSAw algorithm usingw C, orw C++, orw Pythonw Programming
language.
13
14
Question 4
Completew the certificationw and attachw a copyw of yourw certification. (5w marks)
15