Students are advised to carefully study the given scenario and complete three tasks based on this scenario. Reconnaissance attack is defined as the unauthorized discovery and mapping of systems, services, or vulnerabilities of the target network. If an attacker or intruder wants to attack a network, he needs some information about target network like which IP (Internet Protocol) addresses are alive, which ports and services are active on those IP addresses and what operating system is running. With reconnaissance attacks, an attacker can gather such information and can execute an actual attack on the target network. For a considerable time reconnaissance attacks are not detected because they have no impact on the network. Operation of reconnaissance attacks Reconnaissance attack is an initial step for an intruder to attack a network. To gather information about the target network, first, an intruder performs a ping sweep of the target network to get IP addresses that are alive. Then, the intruder performs port scans to determine which ports or services are active on the IP addresses which are alive. After determining live ports, the intruder starts querying the ports to find what operating system is running, the type and version of the applications, software running and the configuration that has been applied on the target host. Reconnaissance attack can be used as an administrative tool or as an attacking tool. Access Attacks Access attacks can be said as accessing network traffic in an illegal way. With the help of access attacks intruders can retrieve data, gain access and can escalate their access privileges across the networks or systems. They are used to gain access to confidential databases, web accounts and other sensitive information. Access attack can occur in different ways. DoS and DDoS After reconnaissance attacks, DoS attacks are the most common form of security attacks. DoS attacks are the most difficult attacks to eliminate completely because they are not targeted to gain access to the network or the information on the network. Attackers use DoS attack to prevent legitimate users from accessing information or services in the network. Task-1 Reconnaissance attacks consist of Packet sniffers, Port scans, Ping sweeps and Internet information queries. Describe each of these and discuss mitigation techniques for each one.Task 2 Access attacks consist of Password attacks, Trust exploitation, Port redirection, Man-in-the-middle attacks and Buffer overflow. Describe each type of access attack and also discuss how these attacks can be mitigated.Task 3 Illustrate Denial of Service attack and Distributed Denial of Service attack with suitable examples of these attacks. Task 4 Select a published paper (preferably from the ACM DL or IEEE CSDL) that is discussing one aspect of Network Security (For example, Latest encryption and decryption techniques, different types of attacks and their mitigation etc). Summarize this paper in one page. The summary should include the main ideas presented in the paper. The paper you select MUST NOT BE DISCUSSED BY ANOTHER STUDENT.Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
In Semester Examination
Assignment + Viva
Module: Network Security (COMP 30019)
Level: 3
Max. Marks: 100
ID NUMBER
Duration: 5 Weeks
Submission Date:13th Week [7th January, 2017]
Outcomes:
1- Design and Configure Microsoft Forefront Threat Management Gateway and implement
network polices
2- Recommend an Internet security architecture for a given context
Instructions to Student:

This assignment has three parts work proposal, Part-A and Part-B

You will get three different links on moodle for submitting work proposal, Part-A and
Part-B.

Work Proposal consists of 10 Marks, Part-A consists 50 marks and Part-B consist of 40
marks.
Work Proposal
Submit a work proposal for this assignment by the end of week 10 th
(10 marks)
Work proposal must include
Understanding of deliverables – a detail description of deliverables
General overview and initial understanding of solution.
The work proposal must be submitted in a word file through the link available in Moodle.
Part-A
Students are advised to carefully study the given scenario and complete three tasks based on this
scenario.
Reconnaissance Attack
COMP 30019 (CW2)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
Reconnaissance attack is defined as the unauthorized discovery and mapping of systems, services, or
vulnerabilities of the target network. If an attacker or intruder wants to attack a network, he needs some
information about target network like which IP (Internet Protocol) addresses are alive, which ports and
services are active on those IP addresses and what operating system is running. With reconnaissance attacks,
an attacker can gather such information and can execute an actual attack on the target network. For a
considerable time reconnaissance attacks are not detected because they have no impact on the network.
Operation of reconnaissance attacks
Reconnaissance attack is an initial step for an intruder to attack a network. To gather information
about the target network, first, an intruder performs a ping sweep of the target network to get IP addresses
that are alive. Then, the intruder performs port scans to determine which ports or services are active on the IP
addresses which are alive. After determining live ports, the intruder starts querying the ports to find what
operating system is running, the type and version of the applications, software running and the configuration
that has been applied on the target host. Reconnaissance attack can be used as an administrative tool or as an
attacking tool.
Access Attacks
Access attacks can be said as accessing network traffic in an illegal way. With the help of access attacks
intruders can retrieve data, gain access and can escalate their access privileges across the networks or
systems. They are used to gain access to confidential databases, web accounts and other sensitive
information. Access attack can occur in different ways.
DoS and DDoS
After reconnaissance attacks, DoS attacks are the most common form of security attacks. DoS attacks
are the most difficult attacks to eliminate completely because they are not targeted to gain access to the
network or the information on the network. Attackers use DoS attack to prevent legitimate users from
accessing information or services in the network.
Task-1
Reconnaissance attacks consist of Packet sniffers, Port scans, Ping sweeps and Internet information queries.
Describe each of these and discuss mitigation techniques for each one.
Task 2
COMP 30019 (CW2)
[2.5*4=10]
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
Access attacks consist of Password attacks, Trust exploitation, Port redirection, Man-in-the-middle attacks and
Buffer overflow. Describe each type of access attack and also discuss how these attacks can be mitigated.
[5*4=20]
Task 3
Illustrate Denial of Service attack and Distributed Denial of Service attack with suitable examples of these
attacks.
[2*5=10]
Task 4
Select a published paper (preferably from the ACM DL or IEEE CSDL) that is discussing one aspect of Network
Security (For example, Latest encryption and decryption techniques, different types of attacks and their
mitigation etc). Summarize this paper in one page. The summary should include the main ideas presented in
the paper. The paper you select MUST NOT BE DISCUSSED BY ANOTHER STUDENT.
[10]
Part-B
Objective: Configure NIS, cache and intrusion detection
Scenario: You work as network administrator for Ibn Trading and Contracting Company. The company has
implemented Microsoft Forefront TMG as the firewall. The Company management wants to implement
Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the
range 10.20.20.10 to 10.20.20.30. Those servers are considered administration servers, and do not require NIS
traffic evaluation. TMG should check for updates every 45 minutes to obtain new signatures. The company
wants to follow the default Microsoft policy when network traffic matches one of the active signatures. The
TMG intrusion detection should be able to detect Ping of death, UDP bomb and IP half scan attacks and all
sorts of DNS attacks. TMG should filter the Time stamp and Loose Source Route during the IP options filtering.
The Company management wants to block packets containing IP fragments, but wants to give the default
settings for the SIP parameters. The Company wants to enable caching and allocate 200MB for caching.
Tasks:
1) Configure an exception named ‘admin’ for the NIS and configure the NIS to meet the above
requirements.
COMP 30019 (CW2)
(3+6 marks)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
2) Configure an intrusion detection setting and IP options filtering to meet the above requirements.
(4+4 marks)
3) Enable caching and allocate cache memory.
Tasks
Maximum
Mark Scored
(3 mark)
Remarks
Marks
Configure
3
exception
Configure
6
NIS
Intrusion
4
detection
setting
IP options
4
filtering
Cache
3
allocation
Objective: Publish Web Site and configure content download job
Scenario: You are the network administrator for ABC Company. The company has implemented Microsoft
Forefront TMG as the firewall. The company works 6 days a week (Saturday to Thursday) from 8am to 5pm.
The company uses non Windows operating system throughout the network. The ABC administration wants to
publish a web site using the URL http://www.abccompanyllcoman.com which has an internal site name portalabccomp.com. This web site do not have much bandwidth requirement. You want to restrict access to this
web site only during work hours. There are no user limitations to access the web site and no encryption is
COMP 30019 (CW2)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
required. All the employees require content from www.magnanet.com on a daily basis. The ABC
administration wants to reduce the bandwidth usage during the peak hours.
Tasks:
1) Configure a publishing rule called ‘TestPub rule’, web listener called ‘TestListener’ and Schedule called
‘TestSchedule’ to meet the above requirements.
(4*3=12 marks)
2) Configure content download job for the company with the name ‘TestConDownload’. The download
job should start from today 11pm with the maximum depth of links per page 90.
Tasks
Maximum
Mark Scored
(8 marks)
Remarks
Marks
Web
4
listener
Schedule
4
Publishing 4
Rule
Content
8
download
job
Evaluation Criteria:
You would be evaluated on the following:

Originality of answer, i.e. writing in your own words with some amount of
referenced material.

Presentation + Viva: Your Assignment marks are based on the Presentation + viva, which will
COMP 30019 (CW2)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
be conducted upon submission of assignment, 13th Week. The Presentation + Viva will be based on
the tasks given in the assignment. ZERO marks will be awarded to the student if she / he is absent
for VIVA.

Analytical Skills: Student’s analytical skills, reflective skills and deep understanding
will be evaluated based on submitted assignment and in the Presentation/Viva.

Zero marks will be awarded if student is absent for Viva.

Student will be given 10 minutes for Viva.

The contribution of the student will also be evaluated during the Viva.
Correct information and presentation in document form.
Adequate referencing and citation provided.
Guidelines:
i.
The assignment should not be more than 10 pages in (size A4) paper.
ii. The document should be well presented and neatly done.
iii.
Assignment should be computer typed using Times New Roman 12 font and the soft
copy should be submitted through Moodle via available link by week 13.
iv.
The report must have a Title Page, table of contents, reference/ bibliography
and page number. Every page must have header & footer.
v.
Heading should be with Font Size 14, Bold, and Underline.
vi.
Each student has to do the assignment individually.
vii.
You are welcome to discuss about the assignment with the lecturer in his
office hours.
Plagiarism policy:
Clarification on Plagiarism Policy
As per MEC policy, any form of violation of academic integrity will invite severe penalty.
Plagiarised documents, in part or in whole, submitted by the students will be subject to this policy.
A. First offence of plagiarism
a. A student will be allowed to re-submit the assignment once, within a maximum period of one
week. However, a penalty of deduction of 25\% of the marks obtained for the resubmitted work will
COMP 30019 (CW2)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
be imposed.
b. Mark deduction: When the work is resubmitted, the marking will be undertaken according to the
marking criteria. In compliance with this policy, the 25\% deduction is then made on the marks
obtained. For example, in an assessment that carries a maximum of 50 marks, suppose a student
were to obtain 30 marks for the resubmitted work, the final marks for that assessment will be 22.5
(after deducting 25\% of the marks actually obtained for the resubmitted work).
c. Period of resubmission: The student will have to resubmit the work one week from the date he or
she is advised to resubmit. For example, if the formal advice to resubmit was communicated to the
student on a Sunday (latest by 5 pm), the student will have to resubmit the work latest by next
Sunday 5 pm.
d. If the re-submitted work is also detected to be plagiarized, then the work will be awarded a zero.
e. Resubmission of the work beyond the maximum period of one week will not be accepted and the
work will be awarded a zero.
B. Any further offence of plagiarism
a. If any student is again caught in an act of plagiarism during his/her program of study (either in
the same module, same semester or in any other semester), the student will directly be awarded
zero for the work in which plagiarism is detected. In such cases, the student will not be allowed to
re-submit the work.
2 C. Guidelines
a. Type 1: In case plagiarism is detected in any component or part submission (submitted at
different times) of one assessment (assignment), the deduction in marks will be applicable for the
whole assessment (assignment), even if only the component or part submission alone needs to be
resubmitted.
b. Type 2: In case plagiarism is detected in a group assessment, all students of the group will be
COMP 30019 (CW2)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
considered as having committed an act of plagiarism irrespective of whether plagiarism is on
account of the act of all or a few or only one member. The policy will then be applied to all
students.
c. Type 3: Combination of Type 1 and Type 2: In case plagiarism is detected in any component or
part submission (submitted at different times) of a group assessment (assignment), the deduction
in marks will be applicable for the whole assessment (assignment), even if only the component or
part submission alone needs to be resubmitted. All students of the group would be considered as
having committed an act of plagiarism irrespective of whether plagiarism is on account of the act
of all or a few or only one member. The policy will then be applied to all the students of the group.
d. Type 4: Variation of Type 1 and Type 2: In cases where the assessment consists of components
or part submissions that could be a group assessment component (e.g. group assignment) and an
individual assessment component (e.g. individual reflection), the following will be applicable:
1. If plagiarism is detected in the group assessment component, all students of the group will be
considered as having committed an act of plagiarism, irrespective of whether plagiarism is on
account of the act of all or a few or only one member. The policy will then be applied to all
students of the group. In such cases the group assessment component will be resubmitted as per the
policy.
2. If plagiarism is detected in the individual assessment component, the individual assessment
component will be resubmitted as per the policy. The policy will then be applied to that student
alone.
3. In both cases (a) and/or (b), the deduction in marks will be applicable for the whole assessment
(assignment).
3 D. Amount of similar material
a. The total amount of similar material in any form of student work from all sources put together
should not exceed 30\% (including direct quotations).
b. The total amount of quoted material (direct quotations) in any form of student work from all
COMP 30019 (CW2)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
sources put together should not exceed 10\%.
c. The total amount of similar material in any form of student work from a single source should
not exceed 7 percent. However, cases having a similarity of less than 7 percent in such cases may
still be investigated by the faculty depending on the seriousness of the case.
d. If faculty member find enough merit in the case of a student work with a similarity (with a
single source) of more than 7 percent as not a case of plagiarism, the faculty member should
provide detailed comments/remarks to justify the case.
Late Submission policy:
Penalty for late submission – 5\% of the maximum mark specified for the assessment will be
deducted for each working day.
Assessment documents submitted beyond a period of one week after the last date of
submission will not be accepted and will be marked as zero for that assessment.
Rules & Regulations
If two assignments are similar in all aspects then marks will be deducted from both
the assignments.
Your source of information should be mentioned in the reference page clearly. (For
example: If it is from book, you have to mention the full details of the book with
title, author name, and edition and publishers name. or if it is from internet you have
to mention the correct complete URL).
COMP 30019 (CW2)
Network Security (COMP 30019)-Fall-2016-CW2 (Assignment)-QP
MODULE NAME: Network Security (COMP 30019)
Assessment Sheet –Basic Assignment Analysis:
Aspects
0 – 10
Submission of
work Objectives of the Assignment clearly identified
Deliverables
Initial understanding of Tasks.
Sources of data are clearly identified -credibility of the research sources are
established
0
1-5
6-10
proposal
Task A
Deliverables
Aspects
Reconnaissance
attacks
Aspects
0
Aspects
0
Part A
(Task-4)
Aspects
Part B
0
1-5
No
attempt/
Plagiarized Summarization is not
report subjectively
Summarize research
paper in one page
Aspects
Deliverables
1-5
0
1-20
TMG Configuration
Incomplete Commands
(Detail marking grid is
attached with
question)
No attempt
Complete explanation of
Technique used for
Access attacks and their
mitigation
6 – 10
06 -10
Mark
21 -40
Marks
Complete
Commands
Penalty
Name of the student
:
ID
:
Section
:
Mark
Summarization is done
objectively
Total Marks
COMP 30019 (CW2)
Mark
No
attempt/
Complete explanation
Plagiarized Incomplete explanation of of DoS and DDoS
report DoS and DDoS Attacks
Attacks
Illustrate Denial of
Service attack and
Part A Distributed Denial of
(Task-3) Service attack
Deliverables
1120
1-10
No
attempt/ Incomplete explanation of
Plagiarized Technique used for Access
report
attacks and their mitigation
Part A
(Task-2) Access attacks
Deliverables
Mark
No
Complete explanation
attempt/
of Reconnaissance
Plagiarized Partially explanation
report
of Reconnaissance attacks attacks
Part A
(Task-1)
Deliverables
Mark
Final Marks

Purchase answer to see full
attachment




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.