Explain, critically analyse and evaluate host-based security principles, tools and techniques.

Publish By: Admin,
Last Updated: 08-Jul-23
Price: $120

Assignment - Vulnerability Investigation

Learning outcome 1: Design and maintain a defensible computer host.

Learning outcome 2: Apply relevant computer security principles, tools and techniques.

Learning outcome 3: Explain, critically analyse and evaluate host-based security principles, tools and techniques.

Learning outcome 4: Solve problems systematically.

Assessment Task:

In this coursework you are expected to:

Question 1. Examine a known vulnerability present in software running on a host-machine or network component. The vulnerability should be chosen from one of the topic areas covered in the module. For example:

Host-based security: software security, flaws in programs (buffer overflows, stack smashing), access control mechanisms (ACLs, UNIX file permissions, MAC, DAC, RBAC), authentication technologies (passwords, password management, biometrics, tokens, multi-factor).

Network security: security protocols, cryptography (e.g., AES, RSA, digital signatures, key management (PKI, x.509)), link-layer security (e.g., ARP cache poisoning), transport-layer security (e.g., TLS), application-layer security (e.g., DNS/DNSSEC, firewalls, intrusion detection systems, wireless and mobile security)

Question 2. Analyse the underlying flaw, including describing technical details and making appropriate reference to the academic literature, the CVE and CWE databases.

Question 3. Find an exploit for this vulnerability and demonstrate how a successful attack can be launched in a virtual environment.

Question 4. Investigate how this particular attack can be detected, for example by a system administrator.

Question 5. Critically analyse countermeasures that can prevent or at least mitigate the risk of this attack, making appropriate reference to security design principles.