MSc Cloud Network Security SEC7002 Advanced Cloud Penetration Testing and Fore

Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates

For This or a Similar Paper Click To Order Now

MSc Cloud Network Security
SEC7002 Advanced Cloud Penetration Testing and Forensics
2022/23 Semester 1
Main assignment:
ASSIGNMENT TITLE
SECURITY ANALYSIS PRACTICAL

PARAMETERS

Hand in date for this assignment is 15th January 2023 closing at 16.00hrs.
Release date:02/11/2023.
Work submitted must be your own unless the appropriate references are quoted within the text. Particular attention is drawn to the unfair means regulations which you have access to. For example, it is not permitted to have just a bibliography of references; if you use someone else’s material provide a citation in the text for all references used.
Students who fail to submit assessments by the specified date (without an extension being granted or without accepted Mitigating Circumstances) will be subject to the following penalties: See Student Handbook for details:
https://www.bolton.ac.uk/assets/Uploads/Assessment-Regulations-for-Undergraduate-Programmes-2020-21.pdf
Please note that it is your responsibility to ensure that the assignment is submitted in the format/s specified in the Module Guide or on the Assessment Brief. Submit your assignment work via the Moodle Turnitin system.
YOU SHOULD ALWAYS ENSURE YOU KEEP A COPY OF ANY ASSIGNMENT SUBMITTED BY WHATEVER METHOD

In the case of exceptional and unforeseen circumstances, an extension of up to 5 days after the assessment submission deadline may be granted by your Programme Leader.
Requests for extensions for periods longer than 5 days must be made using the Mitigating Circumstances procedures. Please see your Programme Handbook for further details.

DELIVERABLES

Create your security case study by choosing a specific domain/s to do your penetration testing and risk assessments and countermeasures.
Passive security artefacts, accepted.
Section A)
Scanning is a set of procedures for identifying live hosts, ports, and services, discovering the Operating system and architecture of the target system, and Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organization.
Scanning refers to collecting more information using sophisticated and aggressive reconnaissance techniques
Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from Kali Linux to scan Metasploit Virtual machine,
Critically analyse the results to show the open ports and the services running on different ports and highlight on the advanced features in nmap.
Perform another sweep scanning on a specific network using the zenmap to draw The Network Topology.
Support your report and analysis with screenshots.
Section B)
Perform a thematic literature review, on the latest development in the field of Intrusion Detection and Prevention (IPS/IDS), using anomaly, protocol, and signature inspection methods.
Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules to alert about any tcp connection from any external source to our ssh port.
Use scholarly articles, books, and other sources (e.g., dissertations, conference proceedings) to insightfully and critically surveyed relevant literature.
Support your work with codes and screenshots.
Section C)
Evaluate the digital forensic memory analyses in terms of the processes, pslist, pstree, LdrModules, hashdump, and other volatility plugins to get significant digital evidence.
Assuming that a forensic team follows the standard steps for preserving evidence integrity and keeping an unbroken chain of custody, what did they do to convince the court, and why they have done so?
Section D)
Critically evaluate the Metasploit Framework and explains why it is important to use this framework during the penetration testing process and the main functionality of this product.
Give an example of using MSF to exploit a vulnerability in a remote system. Support your case with screenshots, and show your ability to solve different technical issues.
Module Learning Outcomes
1-
Formulate an attack strategy to penetrate cloud-based systems within legal boundaries and accepted scope.
Yes

2-
Recommend remedies for compromised cloud systems..
No

3-
Explain the extent and impact of an attack using a forensic approach
No

4-
Employ attack strategies to attempt to penetrate a target computer system
Yes

Presenting Your Work
You should submit your work in a word-processed document, e.g. MS Word, LibreOffice Writer, etc.
Your document must state: 1) the module number and title; 2) the assessment number and title; 3) your student number. This work will be marked anonymously.
The module guide contains further guidance on the presentation of your work.
Expected Number of Sources
Require the use of at least 17 academic research resources; this includes recent scholarly research and recently published scientific books, to avoid plagiarism, any external material used in your work must be appropriately referenced and cited. Please see the module guide for more information.
Submitting Your Work
You must upload your work using the Turnitin submission link on the Moodle page for this module.

For This or a Similar Paper Click To Order Now

SmiteWriter
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.