代做IFN583 Computer Systems and Security代做留学生SQL语言程序

IFN583 Computer Systems and Security

The use of generative AI tools such as ChatGPT, Microsoft Copilot is strictly forbidden for all assessment tasks in IFN583 and will be considered an act of major academic misconduct incurring an automatic mark of 0.

Assessment Task 2: Written Report

Weighting: 40%

Group/Individual: Individual

Due date: End of Week 10 (3rd October)

1 Assessment task

You work for an information security consultancy company. You have been asked to write an Infrastructure and Architectures report for a client organisation whose CEO has recently contacted the company you are employed by. Your report must be customised for the scope provided by the client organisation.

2 Report structure and format

Your report should be written in Word, with a header and footer on each page. Include student number and name in the header, and the unit code IFN583, and page number in the footer. Use 12-point font, 1.5 spacing

The report should have the following sections and content:

1. Title page

2. Table of contents

3. Introduction

A general overview (100 words max) of the importance of Infrastructure and Architectures for enterprises.

4. Infrastructure and Architectures Scope

As this report activity involves writing a report for a particular organisation begin this section with an assumption about your hypothetical large client organisation, and the industry sector the organisation belongs to.

This may be an entirely fictitious organisation, or you may base your hypothetical organisation on an organisation you know from previous personal experience.

Choose your organisation by deciding on

· The name of the hypothetical large client organisation and

· An industry sector from the following list:

o Public administration and safety

o Health care

o Telecommunications

o Utilities (electricity, gas, water, etc)

o Finance (banking, insurance)

o Transport and logistics

o Defence

o Retail

o Hospitality

Then, from the table below research the topic corresponding to your official QUT registered Tutorial Class (as shown in the Tutorial_Official Student Registration  spreadsheet and also recorded in Canvas - People).

[Submitting research on a topic not corresponding to your registered section will incur a penalty of 25% grade reduction.]

Prepare a report for your client organisation related to this topic. Research on the topic should be between 600 and 700 words (essay format).

Research Topic: Tcpdump. (Monday 2-4; Tutor: Eric Ohana)

Tcpdump is a command-line packet analyzer. It displays TCP/IP packets and other packets being transmitted or received over a network and operates on UNIX and Linux operating systems, and versions of it are available for Windows computers. Tcpdump’s power and functionality can be seen by the large number of switches that are available for tcpdump. A complete list of tcpdump switches is available at www.tcpdump.org/manpages/tcpdump.1.html.

Research tcpdump describing it and noting its capabilities. What are its advantages and disadvantages?  What is the Windows equivalent of tcpdump – briefly outline it. How does Tcpdump compare with Wireshark? Which would you choose (Tcpdump or Wireshark), and why? You may include illustrative diagrams to enhance your report.

Research Topic: DDoS mitigation. (Tuesday 6-8, Tutor: Bhargavi Goswami, and Thursday 9-11 Tutor: Tony Rhodes)

For websites, the only real protection against DDoS attacks is DDoS mitigation services. These services will detect abnormal network traffic that may signal an imminent DDoS attack and then reroute the traffic away from the target, either to be filtered or just discarded. This rerouting is most often done in one of two ways. The first method uses DNS redirection. This is accomplished by changing DNS records (specifically the CNAME and A record) to point to the IP address of the mitigation provider, where malicious requests are dropped while legitimate requests are forwarded back to the actual website. In some ways DNS redirection is similar to DNS poisoning. The second method is Border Gateway Protocol (BGP) routing that can divert all Network Layer packets, meaning that it is effective across all protocols to stop various types of Network and Application Layer attacks. However, DDoS mitigation services can be expensive.

Investigate Distributed Denial of Service (DDOS) attacks on websites. Firstly, outline/define a DDOS attack. Then research how most organizations attempt to mitigate a sudden DDoS attack that is directed at their web servers? Use the Internet to research DDoS mitigation techniques, technologies, and third-party entities that provide mitigation services. Which would recommend and why? You may include illustrative diagrams..

Research Topic: Microsoft Macro Protection (Wednesday 4-6, Tutor Tamara Orth)

Due to the impact of macro malware, Microsoft has implemented several protections.

· Protected View. Protected view is a read-only mode for an Office file in which most editing functions are disabled and macros will not launch. Files that are opened from an Internet location, received as an email attachment, opened from a potentially unsafe location, opened from another user’s OneDrive storage, or have “active content” (macros or data connections) will display a Protected View warning message.

· Trusted Documents. A trusted document is a file that contains active content but will open without a warning. Users can designate files in the Office Trust Center as trusted. However, files opened from an unsafe location cannot be designated as a trusted document. Also, the ability to designate a trusted document can be turned off by the system administrator.

· Trusted Location. Files that are retrieved from a trusted location can be designated as safe and will not open in Protective View. It is recommended that if a user trusts a file that contains active content, it should be moved to a trusted location instead of changing the default Trust Center settings to allow macros.

Using the internet, research these protections against Microsoft macros. Your research should list each protection type, their strengths and weaknesses, and how they would be implemented in an enterprise. In an appendix, Include a brief description of 3 real-world examples of Macro-Based Attacks.

Research Topic: Network Access Control. (Thursday 4-6, Tutor: Eric Ohana)

Use the Internet to research the network access control (NAC) products from Microsoft and Cisco. Outline the purpose of a NAC product. How are they different? How are they similar? What are some of the options for each product? Which product would you choose, and why? You may include an illustrative diagram to enhance the report.

Research Topic: Compare different types of firewalls. (Friday 8-10, Tutor: Tamara Orth)

Use the Internet to describe network firewalls. Then identify three network firewalls and create a chart that compares their features. Note if they are rule-based or policy-based, perform. stateless or stateful packet filtering, what additional features they include (IDS, content filtering, etc.), their costs, etc. Which would you recommend? Why? You may include an illustrative diagram to enhance the report.

Research Topic: UTM Devices (Monday 6-8, Tutor: Bhargavi Goswami)

UTM devices, or Unified Threat Management devices, are hardware or software solutions that consolidate multiple network security functions into a single, easy-to-manage appliance.

Firstly describe UTM’s, then create a table of four UTM devices available today. Include the vendor name, pricing (if available), a list of features, the type of protections it provides, and any other functions you consider relevant. Based on your research, assign a value of 1–5 (lowest to highest) that you would give each UTM. Include a short explanation of why you gave it that ranking. You may include any illustrative diagram/s to enhance the report.

5. Conclusion

Provide a single recommendation (with brief justification) (50 words max) to the client which they should consider for the topic you have researched on their behalf.

6. References

6.1 Use the QUT APA style. for citation and references. This requires citations within the written text of the assignment, as well as the list of references used.

6.2 Some information about using the APA style. of referencing is here: https://www.citewrite.qut.edu.au/cite/qutcite.jsp#apa-general-how The QUT librarians are also willing to provide assistance: you can check on the QUT Library homepage for links, or ask HiQ how you connect to this service.

3 Report Organisation

The report should be no longer than 2 pages (excluding the title page, table of contents and references). Some information about reporting writing can be found here: https://www.citewrite.qut.edu.au/write/report.jsp.

Note: you need to write a report, NOT a literature review.

3.1 Writing feedback - Studiosity

Studiosity is an online AI-powered English-writing feedback service available to students. The Studiosity Feedback+ service is on-demand and provides timely formative feedback on submitted work.

Studiosity provides general feedback on core academic writing concepts such as structure, word choice, grammar, spelling and punctuation, referencing and critical thinking.

Accessing Studiosity from Canvas – From the Canvas main menu panel find Studiosity 24/7 writing support towards the bottom of the panel.

Watch this short YouTube video to understand how to use Studiosity: https://www.youtube.com/watch?v=013_gHUB3ks

3.2 Academic report writing:

An important aspect of this assessment task is locating relevant information, either in online resources or in print media. However, it is important that the report is written in your own words. Do not just 'cut and paste' or copy information from any source into your report: that is considered plagiarism (a breach of academic integrity) and is not acceptable at QUT. If this is detected, the Unit Coordinator will notify the Faculty Academic Integrity Committee, and the penalties imposed may be severe (See the QUT MOPP for details).

A useful guide to referencing, citation and report writing is: http://www.citewrite.qut.edu.au/ .



热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图