Assignment title: Computer Science
Assignment 1 During the tutorial sessions for this module students will undertake Practical work and other types of investigative work. There are 6 labs that are of particular interest. 1. Penetration Testing 2. Analysis of Breach in Security 3. Protocol Design 4. Security Hardening (Firewalls) 5. Wireless (Wifi) Security Your work will be assessed in 3 ways: 1. Presentation of work carried out (20%) 2. IEEE formatted paper (70%) For a full description of how to obtain each grade of pass, refer to the assignment feedback grid below B grade will be awarded for a complete and accurate submission showing a clear understanding of the subject and appropriate choices. A grade will be awarded for a complete and accurate submission demonstrating (appropriate, not gratuitous) inventiveness and originality of thought. Assignment Tasks: 1. Pen testing Investigate approaches to hardening and penetration testing on an unknown O/S (knppix). You need to investigate and analyse the provided O/S and undertake an in-depth assessment of the system and possible vulnerabilities. 400 words 2. Breach of security: Based on the lab "looking at vulnerabilities and exploitations" found on Moodle, you are to choose a vulnerability based on the latest Windows server OS. Produce a plan for investigating this vulnerability and implement the plan to achieve meaningful results. 500 words 3. Protocol design Investigate the implementation of a given key distribution method that eliminates the problem associated with repudiation. Analyse the process with and without using a third party involvement, Indicating any benefits in the key size, encryption steps, or performance implications. 500 words 4. Firewall hardening: Compare CISCO/Linux/Windows Firewall technology, configure and investigate approaches to identifying potential firewall vulnerabilities. This should lead to a structured approach to firewall hardening assessment. 300 words 5. Wireless(Wi Fi) Security: The use of increasingly complex wireless protocols such as WPA2 with a switch was recommended in a previous practical. Compare the vulnerabilities of this approach with WEP, WPA without a switch. . 300 words. Tips Task1, Discuss the risk& vulnerability of knoppix, list advantages and disadvantages of knoppix. Research +screenshots of knoppix operating system. Task 2, - Research on window 20008+ Risk of window server +Screenshot Task 3 Research + Report +Screenshots Task4 Research + Report + Screenshots Task5 Research + Report+ Screenshots.