- Network Threats and Vulnerabilities, UNIS, Coursework
- Corporate Finance and Business Valuation Coursework
- 5301ELE Digital System Evaluation Coursework, Level 5, LJMU 2024
- Power Electronic Applications and Control Coursework 1 2024
- PE7007 Construction Economics, Coursework Brief – 2024/2025 , NU, UK
- Level 3 Diploma in Adult Care, Coursework, UK: Understand the application of personcentred practices in care settings
- Decide whether each of the following statements is true or false. Justify your answer in each case by giving an example or stating any general result seen at the lecture: Mathematics, Coursework, NU, UK
- 7CO03: Critically assess different ethical standpoints on people practice and the maintenance of high standards of ethical behaviour: CIPD level 7 , Coursework, UK
- SQE2: Oral Skills-Written Skills- Apply the law comprehensively to the client’s situation, identifying any ethical and professional conduct issues: Reflective Portfolio, Coursework, UK
- SQE 1 Preparation: Portfolio Assessment-analyse and reflect upon your development of the practical legal skills that the Solicitors Regulation Authority (the SRA) : Reflective Portfolio, Coursework, UK
- DSM120: Financial Data Modelling, Coursework 1, UK
- DSM070: Building the Blockchain: the chain, mining, and the consensus mechanism: Blockchain Programming, Coursework 3, UOL, UK
- FHEQ Level 7 ES5800 – Systematic review protocol In this assessment you are asked to write a systematic review protocol: Analytical skills for Environmental Managers, Coursework, BUL, UK
- FHEQ Level 7 ES5800 – Data analysis As part of your learning activities in the autumn 2023 term, you have measured reaction times using the ruler drop test among athletes: Analytical skills for Environmental Managers, Coursework, BUL, UK
- FHEQ Level 7 ES5800 – Analytical skills for Environmental Managers, Coursework, BUL, UK
- CIPD – 5CO02: Quantitative and qualitative analysis review: Evidence-based practice, Coursework, MOL, UK
- CIPD – 5CO02: You are to produce a report that provides the Senior Management team with knowledge and understanding of what evidence based practice: Evidence-based practice, Coursework, MOL, UK
- CIPD – 5CO02: Your manager has just returned from the monthly Senior Management meeting where all departmental heads have been asked to present a report: Evidence-based practice, Course Work, MOL, UK
- To apply the concepts covered during the lectures to practical reactor engineering design problems: Advanced Reaction Engineering, Coursework, LSBU, UK
- In this part of the coursework, you will determine the mechanism and develop a rate law for a catalytic reaction from experimental data: Advanced Reaction Engineering, Coursework, LSBU, UK
Demonstrate an understanding of the fundamental concepts and theories of Cybersecurity: Cyber Security Course Work, UOWL, UK
University | University of West London (UoWL) |
Subject | Cyber Security |
Learning Outcomes,
- Demonstrate an understanding of the fundamental concepts and theories of Cybersecurity.
- Demonstrate evidence of critical thinking, analysis, synthesis, and evaluation in the design and formulation of Cybersecurity solutions.
- Select relevant Cybersecurity tools and techniques, and show how they can be effectively
Task 1:
Network Diagram (addressing LO1): With reference to the network description in the scenario, you are required to draw a network diagram following the approach covered in the week 6 seminar. You must label all devices with reference to the following: operating system version, I Tech’s domain name is mapped to IP address 134.83.62.1); and role of the device (e.g., web server, workstation, network switch). You can create subnets for each space (e.g., Office, Server room, etc.) using all the IP addresses in the range 134.83.62.1-134.83.62.254 in order to keep spaces separate.
During a Red Team exercise, it is discovered that the Windows server which hosts the public-facing website and the internal document storage runs an outdated version of the Microsoft SharePoint 2019 server which has a known software vulnerability (see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41344). This vulnerability can be exploited by an attacker who accesses the document storage service from a remote location to deploy and execute unauthorized code to the Windows server.
This enables attackers to create Windows user accounts on the infected machines and to access the infected machines through Remote Access software such as TeamViewer, Go2Assist, and LogMeIn. In addition to the vulnerability discovered during the Red Team exercise, the National Cyber Security Centre has recently issued an advisory that UK businesses are actively being targeted by crypto-jacking attacks.
Cryptojacking is the act of taking over infected machines to utilize idle CPUs for mining cryptocurrencies such as Bitcoin and Ethereum. In this type of attack, corporate employees are sent phishing e-mails
Do You Need Assignment of This Question
Task 2
Threat Reporting and Attack Vector Mapping (addressing LO1 and LO2): Taking into account the Red Team exercise findings and the NCSC advisory, you are required to identify potential threats to the assets in the network. You must identify and justify at least one threat based on the findings of the Red Team exercise and at least one threat based on the NCSC advisory. In addition, you must identify the attack vectors that should be employed if a threat agent gives rise to these threats, describe how these attack vectors can pose a threat to an asset, and map these vectors to the MITRE ATT&CK framework. Specifically, you should match the attack vectors to the Tactics and Techniques in the ATT&CK framework
Task 3
Risk Assessment (addressing LO2): Having identified the required number of threats, you are required to conduct a risk assessment for the Brunel Tech start-up network. You must use the risk register that is provided in the coursework template and explain the Confidentiality, Integrity, and Availability implications for Brunel Tech
Task 4
Risk Controls (addressing LO3): Using the risk register that you have compiled in your response to Task 3, you are required to select the appropriate controls to mitigate the risks that you have identified and give the reasons for your chosen controls. At least one control must be selected for each of the risks that you have specified and you must specify the Cybersecurity tools that implement the risk controls that you have chosen
Buy Answer of This Assessment & Raise Your Grades
Hire a top-notch coursework writing service at StudentsAssignmentHelp.co.uk. our coursework writers are experienced and knowledgeable to design step-by-step coursework solutions on cyber security assignments at the lowest price.