BNS-4253 Network Security Assignment
- University :
UNIVERSITY OF FUJAIRAH COLLEGE OF INFORMATION TECHNOLOGY Exam Question Bank is not sponsored or endorsed by this college or university.
- Country :
United Arab Emirates
1 |
Identify security vulnerabilities and threats in networks and operating systems. |
2 |
Explore attacks on endpoints using malware and survey of application attacks. |
3 |
Examine strategies to transport data securely over networks using cryptography and Public key infrastructure. |
4 |
Analyze potential indicators associated with wireless networks and its configurations. |
5 |
Evaluate authentication, risk management and privacy control mechanisms to secure networks and applications against various attacks. |
1.Submit a report of Protection mechanisms used in UOF network ( both software and hardware)Prepare a ppt and present
2. Conduct ARP poisoning in your local cache, DNS poisoning in Local hosts file for University ofFujairah- (refer book Project 8.1,8.2) submit a report showing the steps, snapshots,
explanation for each attack- any solution/how to rectify each attack- Prepare a ppt and present
3. Research the Internet regarding robot sentries. Where are they being used? What is the purposeof a robot sentry? What are the risks? What is your projection on the future for robot sentries?Write a one-page paper on your research. Prepare a ppt and present.
4. Use the Internet to research WPA3 features, particularly SAE and OWE. What are the primaryadvantages and disadvantages of each of these features? How do they enhance Wi-Fi security?Write a one-page paper on your research. Prepare a ppt and present
5. Use the Internet and other sources to research the two disadvantages of standard biometrics:cost and error rates. Select one biometric technique (fingerprint, palm print, iris, facial features,etc.) and research the costs for having biometric readers for that technique located at twoseparate entrances into a building. Next, research ways in which attackers attempt to defeat thisparticular standard biometric technique. Finally, how often will this technique reject authorizedusers while accepting unauthorized users compared to other standard biometric techniques?Based on your research, would you recommend this technique? Why or why not? Write a one-page paper on your findings. Prepare a ppt and present
6. North Ridge Security provides security consulting and assurance services. You have recentlybeen hired as an intern to assist them. You have been asked to make a presentation for a localcommunity group about password security. 1. Create a PowerPoint presentation for the groupabout the risks of weak passwords and how to create strong passwords. Include informationabout security keys and how smartphones can be used for MFA. Your presentation shouldcontain at least 10 slides. 2. After the presentation, the community group has asked for yourrecommendation on security vaults and keys. Use the Internet to identify two of each type thatyou would recommend and create a memo to the group that includes why you see these asbeing strong choices. Prepare a ppt and present