New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
MITS5004
AU
Victoria institute of technology
This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve the ability of students to critically analyse security tools and present their findings. The assignment provides an opportunity to work in a group and to achieve a joint objective.
Description
Each group is required to critically analyse any 2 security tools from the list and demonstrate the functionality of the tools in a video presentation. The list of tools for the assignment include:
• Hydra
• Maltego
• NMap
• Zed Attack Proxy
• SqlMap
• Metasploit Framework
• Burp Suite
• Nessus
• Nikto
• Snort
The tools need to be launched in Linux terminal (a user could be created for any member of the group).
Each group is required to:
1. Install and launch the 2 security tools in Linux terminal (a user could be created for any member of the group). Screenshots need to be provided with a brief description.
2. Evaluate 4 features of each tool. Description and screenshots need to be provided for each tool.
3. Critically analyse each tool in terms of:
a) Ease of Use
b) Performance
c) Scalability
d) Availability
e) Reporting and analytics
4. Demonstrate the 4 features of the tool in a short video not more than 5 Minutes. Each student is required to demonstrate 1 feature for each tool. If a student does not demonstrate in the video, the student will not be marked for the demonstration marks
Instructions
These instructions apply to Assignment 3 Group Assignment – Critical Analysis of Network Security Tools. The students are required to form a group comprising of 2 to 4 students from the same session. The group is required to notify the lecturer of the students in the group and the network security tools that they have opted for by the end of week 6.
Submissions
Each group is required to submit a single report and a video presentation on the given link on moodle. Each student is required to demonstrate 1 feature of each network security tool in the video presentation.
Submit your report to the Moodle drop-box for Assignment 3. Note that this will be a turn-it-in drop box and as such you will be provided with a similarity score. This will be taken into account when grading the assignment. Note that incidents of plagiarism will be penalized. If your similarity score is high you can re-submit your report, but re-submissions are only allowed up to the due date. If you submit your assignment after the due date and time re-submissions will not be allowed.
Please Note: All work is due by the due date and time. Late submissions will be penalized at the rate of 10% per day including weekends.
Your report should be limited to approx. 2000 words (not including references). Use 1.5 spacing with a 12 point Time New Roman font. Citation of sources is mandatory and must be in the IEEE style.
15,000+ happy customers and counting!