代做LD6047 Ethical Hacking代写数据库编程

Programme:

BSc Computing with - ALL pathways

Module Code:

LD6047

Module Title:

Ethical Hacking

Distributed on:

Via Blackboard; briefing in lecture.

Submission Time and Date:

To be submitted by 16:00 GMT on [21 Jan 2025]

Word Limit:

Part A: 60% (2000-word report)

Part B: 40% (1500-word report)

Weighting

This coursework accounts for 100% of the total mark for this module

Instructions on Assessment:

This assignment consists of two parts

· Part A (60%): 2000 words

· Part B (40%): 1500 words

Assignment Details:

TechSecure Ltd. is a rapidly growing UK-based company that provides secure web-based solutions to clients across various sectors, including finance, healthcare, and e-commerce. As part of their growth strategy, they have deployed a new web application hosted on an Ubuntu server in a cloud-based virtual environment.

The web application handles sensitive client data, including payment information, personal identification, and transaction records. Due to the sensitive nature of the data processed, the company must ensure that the application is secure from cyber threats. Recently, the IT department noticed some unusual activity on the server logs, which raised concerns about potential vulnerabilities within their system.

To   address   these   concerns, TechSecure   Ltd.   has   requested   a   thorough   security assessment of their web application to identify any vulnerabilities before they can be exploited by malicious actors. As part of their internal audit, they have enlisted your help as a penetration tester.

Your Role:

You have been provided access to a simulated environment consisting of:

• A Virtual Machine running Ubuntu, hosting the TechSecure Ltd. web application.

• A Kali Linux system to conduct the penetration test. Your primary objectives are:

Vulnerability Assessment:

1. Use a vulnerability assessment tool of your choice (such as Nessus, Niko, or OpenVAS) to scan the web application hosted on the Ubuntu machine.  Identify any weaknesses or misconfigurations that could be exploited.

2. Focus on areas like outdated software, open ports, misconfigured services, or known web application vulnerabilities like SQL injection, Cross-Site Scripting (XSS), and server misconfigurations.

3. Generate a detailed report from the chosen tool that lists the identified vulnerabilities, along with their severity levels and descriptions.

Penetration Testing:

1. After identifying vulnerabilities, attempt to exploit them using Kali Linux to gain access to the target machine

2. Perform. reconnaissance to gather information about the target, such as available services, open ports, and the web server's configuration.

3. Use appropriate penetration testing methods to exploit the identified vulnerabilities and demonstrate how access to the web server could be achieved.

4. Document each step of your process, including screenshots, tools used, and the techniques applied.

Reporting:

1. Compile a comprehensive report outlining your findings, including:

2. A summary of the identified vulnerabilities and their potential impact.

3. The steps taken to exploit the vulnerabilities and gain access.

4. Recommendations for mitigating the identified risks and securing the web application against future threats.

Mapping to Programme Goals and Objectives

This assignment will assess the following learning outcomes:

1. Demonstrate practical skills in conducting vulnerability assessments using industry-standard tools.

2. Apply penetration testing methodologies to gain access to a target system.

3. Analyse   and critically evaluate cyber   incidents, providing insights into their   impact and   mitigation

4. strategies.

5. Present a well-researched report, demonstrating the ability to interpret and analyse CVE information.

Module Specific Assessment Criteria and Rubric

The work will be marked out of 100 in line with the University’s marking grades and according to the following assessment criteria:

Description

Marks

Part A: 60%

Task 1:  – Vulnerability Assessment (VA)
(suggested word limit for this section is 500 words)

· Conduct a vulnerability scan on the provided Ubuntu-based web application using a tool of your choice (e.g., Nessus, Niko, OpenVAS).

· Generate a comprehensive report detailing the identified vulnerabilities, including descriptions, severity levels, and potential impacts.

· Include the generated VA tool report as evidence.

20

Task 2: - Penetration Testing (PT)

(Suggested word limit for this section is 500 words)

· Using the Kali Linux environment, perform. a penetration test targeting the given web application. Your objective is to exploit identified vulnerabilities and gain access to the target machine.

· Document your approach, including reconnaissance, scanning, exploitation, and post-exploitation phases.

· Discuss any challenges faced and how they were overcome.  Provide screenshots where necessary to illustrate your process.

20

Task 3: - Ethical Considerations and Security Standards
(Suggested word limit for this section is 600 words)

· Discuss   the   ethical   implications   of   performing   vulnerability   assessments   and penetration testing   as seen in Tasks 1 and 2.  Reflect on the   importance of maintaining confidentiality, integrity, and professional conduct throughout the testing process.

· Evaluate how compliance with security standards such as ISO 27001, NIST SP 800- 115, or OWASP can guide the penetration testing process and reporting.

· Explain how ethical hacking practices help in aligning security assessments with industry standards and how this benefits organizations like TechSecure Ltd.

· Connect the insights from Task 3 to your work in Part B, particularly regarding the ethical analysis of the chosen cyber incident.

20

Part B – 40%

Task 5 – Cyber Incident Analysis (1000 words)

Scenario:

Choose a significant cyber incident that occurred between 2023-2024. This could be a data breach, ransomware attack, or any other security incident that had a notable impact on an organization, industry, or country.

· Provide a detailed overview of the incident, including when and how it occurred.

· Analyse the statistical impact of the incident, such as data lost, financial loss, or affected users.

· Discuss the countermeasures implemented by the affected organization(s) to mitigate the impact of the incident.

· Include an analysis of the CVE (Common Vulnerabilities and Exposures) that were exploited during the incident, backed by research and evidence.

· Critically assess the effectiveness of the countermeasures and suggest additional steps that could have been taken to prevent or mitigate the incident.

40

Total

100


热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图