TECH2400 Introduction to Cyber Security Assessment 3 Help

TECH2400 Introduction to Cyber Security Assessment 3 Help 

 

Assessment 3 Information

 

Subjec tCode:TECH2400
Subject Name:Introduction to Cyber Security
Assessment Title:Protocol Presentation and Evaluation
Assessment Type:Presentation and Evaluation
Word Count:10Minutes(+/-10%)
Weighting:40%
Total Marks:40
Submission:MyKBS
 :Week13

 

YourTask

 

Inthis assessment, you will undertake an individual task focused on conductinga comprehensive protocolanalysisusingWireshark.Yourobjectiveistothoroughlyexaminethenetworkprotocol trafficcapturedinthedumpfile,delvingintoitsvariousaspectstogainvaluableinsights.Building uponyour analysis, you will createacompelling presentation that not only highlights your findings but also establishes connections to the key concepts covered in class, showcasing your understandingoflearningoutcomeLO1.Thisassessmentservesasameanstoevaluateyour proficiency in network protocol analysis and your ability to apply this knowledge in practical scenarios.Additionally,itprovidesanexcellentopportunityforyoutodemonstrateyourskillsin analysingreal-worldnetworktrafficandeffectivelypresentingyourfindings.

 

Furthermore, this assessment requires you to defend your recommendations to diverse stakeholders,whichinvolvesarticulatingyourproposedstrategies,mitigations,andsolutionsina mannerthataddressestheconcernsandprioritiesofvariousstakeholders.Moreover,itexpects you to contextualise the terminology associated with cybersecurity in a way that is accessible and understandable for diverse stakeholders in the business environment. By effectively communicatingthesignificanceofyouranalysisandrecommendations,youwilldemonstrateyour abilitytobridgethegapbetweentechnicaljargonandthepracticalimplicationsofcybersecurityfor differentstakeholderswithinabusinesssetting.

 

LO1:Contextualisetheterminologyassociatedwithcybersecurityfordiverse  stakeholders in business.


 

Assessment Description Situation:

In the ever-evolvingandintricaterealmoftheinternet,characterisedbyanarrayofsophisticated threatsandtheconstantpresenceofcybercriminals,yourroleasacybersecurityprofessionaltakes onparamountsignificance.WiththenetworkprotocoltrafficWiresharkdumpfile,whichcaptured a pivotal event,your mission istometiculously examine itsintricacies. Your objective is to unravel the technical complexities inherent in this event, leaving no stone unturned. Armed with a comprehensive analysis, you will embark on the critical task of presenting your meticulously gatheredfindings,bridgingthegapbetweentechnicaljargonandthepracticalimplicationsof cybersecurity.Thisincludescontextualisingtheterminologyassociatedwithcybersecurityina mannerthatresonateswithdiversestakeholdersinthebusinesslandscape.Moreover,asan esteemedprofessionaloperatingatthehighestlevelofexpertise,youareexpectedtoengageina profounddiscourseonrobustdefensemechanisms.Bydoingso,youwillequiporganisationswith theknowledgeandstrategiesneededtofortifytheirdefensesagainstthisspecificformofattack.


 

Assessment Instructions

  1. Read thescenarioonthepreviouspage,tounderstandthecontextoftheevent.
  2. GotoMyKBSanddownloadtheWiresharkdumpfile(itwillbeintheformof

<student_ID>.pcap).

  1. Forexample,ifyourstudentIDis12345,the.pcapfilewillbe12345.pcap.
  2. AscoveredintheNetworkTrafficAnalysisworkshop,youmustdownloadandinstall Wireshark.
  3. Openyour.pcapfileusingWiresharktoperformtrafficanalysistoanswerthefollowing questions.
    1. Howmanypacketswerecaptured?
    2. WhatisthedestinationIPaddress?
    3. WhatistheChromeversionnumber?
    4. WhatistherequestURI?
    5. HowmanyTCPpacketswerecaptured?
    6. HowmanyHTTPpacketswerecaptured?
    7. WhatistherelativepercentageofHTTPpacketsthathavebeencaptured?
  4. Beforefinalisingandsubmittingyouranswers,headovertoMyKBStoprocessyourinputof the above questions, to receive real-time feedback, to ensure your answers are correct.
  5. Prepareandcreateyourpresentation,whichmustinclude5referencesandthefollowing slide headings:
    1. Introduction
      1. Introduceyourselfandthesubject.
    2. Background
      1. Provideabriefsummaryofthesituation.
    3. TrafficAnalysis
      1. Provideanswersandexplanationstotheabovequestions,alongsidethe Wireshark filters you used.
    4. IdentifiedAttack
      1. Discusswhichattackyoubelieveoccurredduringthisevent.
    5. DefenceProposal
      1. Proposeanddefendtwodefencesyoubelievewould mitigatetheriskofthe identified attack.
    6. Non-technicalExplanation
      1. Explainthesituation,identifiedattack,anddefenceproposaltoanaudienceof diverse stakeholders.
    7. Conclusion.


 

Important Study Information

 

Academic Integrity and Conduct Policy

https://www.kbs.edu.au/admissions/forms-and-policies

 

KBS values academic integrity.Allstudentsmustunderstandthemeaningandconsequencesofcheating, plagiarism and other academic offences under the Academic Integrity and Conduct Policy.

Please read the policy to lear nthe answers to the sequestions:

 

  • Whatisacademicintegrityandmisconduct?
  • Whatarethepenaltiesforacademicmisconduct?
  • HowcanIappealmygrade?

 

 

 

Late submission of assignments(with in the Assessment Policy)

https://www.kbs.edu.au/admissions/forms-and-policies

  
 A screenshot of a calendar  Description automatically generated


 

 

 

 

Length Limits for Assessments

Penalties may be applied for assessment submissions that exceed prescribed limits.

 

 

Study Assistance

Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at https://elearning.kbs.edu.au/course/view.php?id=1481

Example invalid form file feedback

Join our 150К of happy users

Get original papers written according to your instructions and save time for what matters most.