MITS5004 IT Security – 2020S1 Assignment

MITS5004 Ordinance 3
Copyright © 2015-2018 VIT, Integral Rights Reserved. 2
MITS5004 IT Safety – 2020S1
Ordinance No 3 – Project Composition
Critical Analysis of Safety Dupes
Inferiority Guidelines:
This toll function is greater ordinance and executed in collections (3-4 novices) and you conquer be
required to composition simultaneously to direct your cognizance, to analyse critically the dupes used in IT
security. In this toll you conquer composition in collections by sharing specific functions on a greater
practical inveterate occurrence to analyse and direct resolutions to safety threats, realize safety
components scarcityed and dupe a resolution. This conquer overspread integral the foul-mouthed acquirements outcomes of
the part. Integral inferioritys are to be referted through turn-it-in. Drop-boxes linked to turn-it-in
conquer be determined up in the Part of Study Moodle totality. Ordinances referable referted through these
drop- pummeles conquer referable be considered. Inferioritys must be made by the imputable age and interval. This
Assignment-3 is a collection ordinance and contributes 30% of your part marks – Critical Analysis
of Safety Dupes (Imputable in Assemblage 12)
The turn-it-in co-ordination account conquer be used in determining the plane if any of plagiarism. Turn-itin conquer restrain contravention web-sites, Life catechism, the Web and your acknowledge adjust component
submissions restraint plagiarism. You can conceive your turn-it-in co-ordination account when you refer your
ordinance to the mismismisadduce drop-box. If this is a matter you conquer bear a accident to change
your ordinance and re-submit. However, re-inferiority is singly integralowed anterior to the inferiority
imputable age and interval. Succeeding the imputable age and interval bear departed you canreferable fabricate re-submissions and
you conquer bear to feed with the co-ordination account as there conquer be no accident restraint changing. Thus, plan
existing and refer existing to seize practice of this characteristic. You can fabricate multiple inferioritys, still
fascinate retain we singly conceive the last inferiority, and the age and interval you referted conquer be
taken from that inferiority.
Your instrument should be a barely order or pdf instrument containing your communication.
MITS5004 Ordinance 3
Copyright © 2015-2018 VIT, Integral Rights Reserved. 3
Objective(s)
This toll part relates to the part acquirements outcomes as in the part descriptor. This
toll is prepared to empurpose the ability of novices to critically analyse safety dupes and
present their findings. This ordinance as-well arranges an opening to composition in a collection and to
achieve a articulation concrete.
Description
Each collection is required to critically analyse any 2 safety dupes from the register and manifest the
functionality of the dupes in a video exhibition. The register of dupes restraint the ordinanceinclude:
• Hydra
• Maltego
• NMap
• Zed Attack Proxy
• SqlMap
• Metasploit Framework
• Burp Suite
• Nessus
• Nikto
• Snort
• Wireshark
• Siege
The dupes scarcity to be established in Linux final (a user could be created restraint any component of the
group).
Each collection is required to:
1. Instintegral and embark the 2 safety dupes in Linux final (a user could be created restraint any
component of the collection). Screenshots scarcity to be supposing with a slight cognomen.
2. Evaluate 4 characteristics of each dupe. Cognomen and screenshots scarcity to be supposing restraint
each dupe.
MITS5004 Ordinance 3
Copyright © 2015-2018 VIT, Integral Rights Reserved. 4
3. Critically analyse each dupe in stipulations of:
a) Ease of Use
b) Performance
c) Scalability
d) Availability
e) Communicationing and analytics
4. Manifest the 4 characteristics of the dupe in a incomplete video referable more than 5 Minutes. Each
novice is required to manifest 1 characteristic restraint each dupe. If a novice does referable
manifest in the video, the novice conquer referable be conspicuous restraint the parademarks
Instructions
These instructions direct to Ordinance 3 Collection Ordinance – Critical Analysis of Network
Safety Dupes. The novices are required to restraintm a collection comprising of 3 to 4 novices from
the selfselfsame assemblage. The collection is required to referableify the lecturer of the novices in the collection and
the netcomposition safety dupes that they bear opted restraint by the purpose of week 6.
Submissions
Each collection is required to refer a barely communication and a video exhibition on the fond link on
Moodle. Each novice is required to manifest 1 characteristic of each netcomposition safety dupe in the
video exhibition.
Refer your communication to the Moodle drop-pummel restraint Ordinance 3. Referablee that this conquer be a turn-it-in
drop pummel and as such you conquer be supposing with a co-ordination account. This conquer be seizen into totality
when grading the ordinance. Referablee that incidents of plagiarism conquer be penalized. If your
co-ordination account is eminent you can re-refer your communication, still re-submissions are singly integralowed up to
the imputable age. If you refer your ordinance succeeding the imputable age and interval re-submissions conquer referable
be integralowed.
Fascinate Referablee: Integral composition is imputable by the imputable age and interval. Late inferioritys conquer be penalized at the
rate of 10% per day including weekends.
Your communication should be scant to approx. 2000 orders (referable including references). Use 1.5 spacing
with a 12 aim Interval New Roman font. Citation of sources is mandatory and must be in the IEEE
style.
MITS5004 Ordinance 3
Copyright © 2015-2018 VIT, Integral Rights Reserved. 5
Marking Guide: 75 Marks
Function Cognomen Marks
Introduction Thissection should involve a rare sentences which arrange an outline
of the ordinance.
5
Communication Layout The communication title, vernacular and organization should be misappropriate. 5
Dupe Embark Instintegral and embark the 2 safety dupes in Linux final (a user could
be created restraint any component of the collection). Screenshots scarcity to be
supposing with a slight cognomen.
6
Evaluation Evaluate 4 characteristics of each dupe. Cognomen and screenshots scarcity
to be supposing restraint each dupe.
16
Analysis Critically analyse each dupe in stipulations of:
a) Ease of Use
b) Performance
c) Scalability
d) Availability
e) Communicationing and analytics
20
Parade Each collection is required to refer a video parade of referable more
than 5 minutes, each component is required to manifest 1 characteristic
of each dupe.
15
Conclusion Summary of the communication. 4
References Follow the IEEE title 4
Plagiarism and confederacy
Integral novices in the collections are warned that VIT seizes a earnest continue on Plagiarism and
collusion. VIT conquer direct impenetrable penalties if specifics and collections are caught in academic
misconduct. VIT uses abrupt TURNITIN software built-in the LMS Moodle regularity restraint
detecting plagiarism and confederacy.
Note: Turnitin is a text-matching software that restrains a novice’s written composition against
electronic texts from the Internet, published compositions (such as life catechism and books), and
assignments/reports/catechism previously referted to Turnitin or incorrectly elsewhere by other
students. So fascinate be warned!