首页 > 其他分享 >COM398 Systems Security

COM398 Systems Security

时间:2024-12-20 20:11:00浏览次数:3  
标签:COM398 analysis should Systems PPT Security include presentation your

COM398 Systems Security

60% OF THE TOTAL MARK

Submission Date:                            9th  December 2024 (12:00 (Noon) UK time)

Date returned with feedback:     Within twenty working days after the submission deadline.

CW2 is an individual coursework which is worth 60% of the total coursework mark for this moduleThe successful completion of CW2 will address the following learning outcomes:

•   Develop practical prototypes  to  experiment  with  and  reinforce  core  systems  security concepts.

•   Illustrate acomprehension of the key issues and principles underlying modern security in computing systems

•   Characterise  the  threats faced  by  computing  systems,  applications  and systems;  and examine the role of security risks assessment and management in IT

This coursework component requires students to research, write and make a presentation on the topic of traffic analysis during a DoS / DDoS attack using Wireshark. This element would require each student to prepare PowerPoint slides (10-15) and vodcast of the student presenting the slides. The vodcast should be a maximum of 18 minutes long (vodcast exceeding the maximum limit will be penalised according to the following scheme).

18 minutes + 10%

No penalty

18 minutes + >10% - 20%

reduction in the total mark by 5%

18 minutes + >20% - 30%

reduction in the total mark by 10%

18 minutes + >30% - 40%

reduction in the total mark by 15%

18 minutes + >40% - 50%

reduction in the total mark by 20%

18 minutes +>50%

The  maximum total  mark  achievable  is 40%

This assessment component is designed to encourage students to reflect critically on the fundamentals of systems security; and relate these fundamental concepts to developments within the field, and to real- world practical examples.

The students should submit the PPT 代写COM398 Systems Security they presented along with the video to show their ability to carryout research on the CW topic.

This coursework component requires you to prepare (see also notes 1 & 2, and the coursework preparation,  submission   and  provision  of  feedback  sections   below)   a  video-recorded   PPT presentation and the  PPT file  (video +  PPT slides) on traffic analysis using Wireshark.  In this coursework, you will be only considering the TCP/IP protocols for the analysis. Students will have to log their experience (including any Wireshark based visualisation), observations and analysis of the captured  network traffic  in  a  PPT  document  describing  the TCP/IP  protocol  suit,  and addressing some specific points related to the provided Wireshark traffic file (PCAP file). The PPT document and presentation may include (but not limited to) and address the following points:

1.   An explanation of the TCP/IP protocols suit including:

a)   The  Transmission Control  Protocol  (TCP)  and  User  Datagram  Protocol  (UDP),  and  the difference between the two protocols

b)   The Internet Protocol (IP)

c)   The Difference between TCP and IP

d)   The work of the TCP 3-Way Handshake Process.

2.   Describe and contrast the  Denial-of-Service (DoS) and  Distributed  Denial-of-Service (DDoS) attacks, and their sub-types.

3.   In the provided PCAP file, identify the type of the attack; any of your observations and analysis of the traffic should be justified and explained by adding suitable Wireshark snapshots (or any suitable Wireshark trace visualisation approach that you can embed in your presentation / video)

4.   What is the IP address of the suspected attacker in the PCAP file? Justify and explain?

5.   Reflecting on the detected attack(s), you should add in your conclusion the possible context / cause(s) that allowed such attack(s) to take place; and countermeasure recommendations.

You should prepare your PPT document and presentation in such away that it maybe understood by and useful to a fictitious group of students taking a course in computing and who may be joining placement employers.

Although you have the freedom to adopt and follow your own presentation plan and structure, the expectation, however, is that there should bean ‘Introduction’ in which you should cover the TCP/IP protocols suit from which you can elaborate on the DoS and DDoS as in the points above. The body of the report should be divided and partitioned into sections and any appropriate visualization means should be used (e.g snapshots).

Your  presentation  should  be  evidence-based  and  supported  by  relevant  and  up-to-date references and links. Sources should include textbooks, academic websites, manufacturers’ web sites, RFCs, white papers and academic literature (conferences and journals). You may use your own selected referencing style.

Note 1You can use data from such sources as evidence but you need to express this in your own words.  Plagiarism will not  be tolerated and will be dealt with according to  University policy: https://www.ulster.ac.uk/student/exams/cheating-and-plagiarism.   It  is  inappropriate  to   make  a presentation based on sources which are not listed.

Note 2You should demonstrate good knowledge and understanding of the topics and points of your  presentation;  and  express  them  with  high  effectiveness,  conciseness  and  succinctness. When preparing your presentation, you should make sure to include only the most relevant references.

Coursework preparation, submission and provision of feedback:

This coursework should be returned as an electronic submission by the due date specified above. University regulations require that late submissions attract a mark of zero and will be rigorously applied, without exception. If you have extenuating circumstances, you should complete an EC1 form according to your course rules; forms are found on your course website – your year tutor and course director can advise.

•   What should be returned is file 1) a copy of the PPT document used as the basis of your presentation (in this case your researched material / script. should either be embedded in the notes section or appended to the end of your PPT document)file 2) the video (in a suitable format, e.g. mp4, you may also use Panopto etc  for a Panopto submission, please  refer to the  material  on  the  module  page)  using  the  CW2  link  in  the  module webpage on Black Board (under assessment in the module webpage).

You should also take note of the following:

•    Please  ensure  the filename of the submitted  project  folder  archive  is  given  as Your- BNumber_CW (i.e., B0011_CW2-PPT and B0011_CW2-VODCAST).

•   As it may be expected that the file to be submitted can be of a substantial size, you are advised to attempt your submission early to avoid any IT related issues.

•    Feedback will be provided within 20 working days after submission by the date shown above. Feedback can take the form. of comments and a mark as shown herewith:

Criterion                                                                                    Weight

Research material (to include extent of background research, quality of analysis and citations & references)                           25

Trace files, traffic or design files analysis (as appropriate; and to include quality of analysis and answers and approach justification)                       40

PPT presentation (to include quality of both PPT and text; ad coherence of the points made)                             20

Video recording (to include quality of recording, creativity, communication, organization and clarity, use of adequate visualization techniques (e.g. snapshots)                             15

Comments:

1) Research Material: The material you present should be evidence-based and supported by relevant and up-to-date references.

2) PCAP files analysis: The analysis should include but not limited to filters and graphs to support your argument(s).

3) PPT presentation: When preparing your presentation, you should be sure to include only the most relevant points on the slides: you can give more details in the notes section if you wish to, however, the purpose of the slide is to be succinct in your information. The background image and snapshots (or additional graphics if you want to use them) and sound/audio effects should be relevant to the points being made on the slide.

4) Video recording: Your recording should demonstrate good knowledge and understanding of the topic of your presentation and express them with high effectiveness.

 

标签:COM398,analysis,should,Systems,PPT,Security,include,presentation,your
From: https://www.cnblogs.com/MATH1131/p/18619809

相关文章

  • spring-boot-starter-security放行全部请求
    SpringBoot项目中加了spring-boot-starter-security默认会把全部请求设置要求登录。<dependency><groupId>org.springframework.boot</groupId><artifactId>spring-boot-starter-security</artifactId></dependency>系统自动建一个user用户,密码随机如果想......
  • ACS323  Intelligent Systems
    ACS323 AssignmentIntelligentSystemsAcademic Year:2024/2025Module: ACS323Title: IntelligentSystemsDateSet: Friday   06/12/2024  at 15:00DateforSubmission: Monday23/12/2024   at 23:59Task: Producewrittensolutionsto allthea......
  • COMPSCI 4043 Systems and Networks
    Systemsand NetworksCOMPSCI4043December20221.   (a)    Expressthefollowing in 16-bittwo’s complement representation, giving your answers in hexadecimal. Showyourworking.i.       1000     ii.       -2000......
  • Spring Security集成的详细步骤
    一、项目依赖配置Maven项目如果使用Maven构建项目,需要在项目的pom.xml文件中添加SpringSecurity的依赖。通常包括spring-security-web和spring-security-config。<dependency><groupId>org.springframework.security</groupId><artifactId>spring-security-web<......
  • COMP2012J Operating Systems Memory Management
    OperatingSystemsAssignment02:MemoryManagementCOMP2012J2024-251MemoryManagementSimulatorPleasefindthememorymanagementsourcefilesfromthemoodle.Thissimulatorillustratespagefaultbehaviourinapagedvirtualmemorysystem.Theprogram......
  • tryhackme-Pre Security-What is Networking?(计算机网络基础)
    任务一:WhatisNetworking?(什么是网络)网络就是连接的事物,在计算机中,网络也是相同的概念的,只不过说,他分撒在了各种设备上面,通过这些设备连接,并且遵循一定的规则,我们可以交流。显然答案就是:网络任务二: WhatistheInternet?(什么是互联网)根据上面我了解到了什么是网络 ,也......
  • JC4001 – Distributed Systems
     SchoolofNaturalandComputingSciencesDepartmentofComputingScience2024–2025Programmingassignment–IndividuallyAssessed(noteamwork)Title:JC4001–DistributedSystemsNote:Thisassignmentaccountsfor30%ofyourtotalmarkofthecourse.......
  • 04、SpringSecurity系列,第二章:RememberMe 和 异常处理
    SpringSecurity系列,第二章:RememberMe和异常处理一、RememberMeRememberMe这个功能,是为了方便用户在下次登录时直接登录。避免再次输入用户名和密码。下面我们记录下如何使用RememberMe这个功能的。1、修改login.html页面添加remember-me,注意:字段的name必须是remem......
  • 深入解读 Spring Security 的设备授权码模式:底层运作原理
    1.什么是设备授权码模式 设备授权码模式是OAuth2.1的一种授权模式,旨在解决设备(即客户端)需要访问某些受限的资源但又无法在设备上直接输入用户凭证的情况,比如智能电视、游戏机、IoT设备、打印机等。它是一种再SpringSecurity高版本之后出现的一种新的认证方式。其整体......
  • Spring Security6 实现数据库自定义验证和jwt校验
    SpringSecurity6数据库自定义验证和jwt校验的简单实现以及个人解读版本springboot3.4.0mybatis-plus3.5.7jjwt0.12.6在使用jjwt的时候需要导入三个依赖分别是jjwt-api,jjwt-impl和jjwt-jackson,导入三个有点麻烦,所以可以直接导入jjwt依赖,这个依赖包含前面三个<depen......