/
Questions/
Coursework/
Demonstrate an understanding of the fundamental concepts and theories of Cybersecurity: Cyber Security Course Work, UOWL, UK
Looking For Plagiarism Free Answers For Your UK College/ University Assignments.
BUY NOWDemonstrate an understanding of the fundamental concepts and theories of Cybersecurity: Cyber Security Course Work, UOWL, UK
University | University of West London (UoWL) |
---|---|
Subject | Cyber Security |
Learning Outcomes,
- Demonstrate an understanding of the fundamental concepts and theories of Cybersecurity.
- Demonstrate evidence of critical thinking, analysis, synthesis, and evaluation in the design and formulation of Cybersecurity solutions.
- Select relevant Cybersecurity tools and techniques, and show how they can be effectively
Task 1:
Network Diagram (addressing LO1): With reference to the network description in the scenario, you are required to draw a network diagram following the approach covered in the week 6 seminar. You must label all devices with reference to the following: operating system version, I Tech’s domain name is mapped to IP address 134.83.62.1); and role of the device (e.g., web server, workstation, network switch). You can create subnets for each space (e.g., Office, Server room, etc.) using all the IP addresses in the range 134.83.62.1-134.83.62.254 in order to keep spaces separate.
During a Red Team exercise, it is discovered that the Windows server which hosts the public-facing website and the internal document storage runs an outdated version of the Microsoft SharePoint 2019 server which has a known software vulnerability (see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41344). This vulnerability can be exploited by an attacker who accesses the document storage service from a remote location to deploy and execute unauthorized code to the Windows server.
This enables attackers to create Windows user accounts on the infected machines and to access the infected machines through Remote Access software such as TeamViewer, Go2Assist, and LogMeIn. In addition to the vulnerability discovered during the Red Team exercise, the National Cyber Security Centre has recently issued an advisory that UK businesses are actively being targeted by crypto-jacking attacks.
Cryptojacking is the act of taking over infected machines to utilize idle CPUs for mining cryptocurrencies such as Bitcoin and Ethereum. In this type of attack, corporate employees are sent phishing e-mails
Do You Need Assignment of This Question
Task 2
Threat Reporting and Attack Vector Mapping (addressing LO1 and LO2): Taking into account the Red Team exercise findings and the NCSC advisory, you are required to identify potential threats to the assets in the network. You must identify and justify at least one threat based on the findings of the Red Team exercise and at least one threat based on the NCSC advisory. In addition, you must identify the attack vectors that should be employed if a threat agent gives rise to these threats, describe how these attack vectors can pose a threat to an asset, and map these vectors to the MITRE ATT&CK framework. Specifically, you should match the attack vectors to the Tactics and Techniques in the ATT&CK framework
Task 3
Risk Assessment (addressing LO2): Having identified the required number of threats, you are required to conduct a risk assessment for the Brunel Tech start-up network. You must use the risk register that is provided in the coursework template and explain the Confidentiality, Integrity, and Availability implications for Brunel Tech
Task 4
Risk Controls (addressing LO3): Using the risk register that you have compiled in your response to Task 3, you are required to select the appropriate controls to mitigate the risks that you have identified and give the reasons for your chosen controls. At least one control must be selected for each of the risks that you have specified and you must specify the Cybersecurity tools that implement the risk controls that you have chosen
Buy Answer of This Assessment & Raise Your Grades
Get help by expert
Achieve excellence with our specialized UK assignment help services, including Case Study Writing Help. Struggling with “Cyber Security” at the University of West London (UoWL)? Our experts are committed to your success, guiding you through grasping fundamental concepts and theories in cybersecurity, just like your assignment. Elevate your academic journey and secure top grades by leveraging our expertise. Your path to excellence starts here!
Recent solved questions
- ILM: Assess own leadership behaviours and potential in the context of a particular leadership model and own organisation's working practices and culture: Leadership skills and development, Assignment, UOA, UK
- ILM: Describe the factors that will influence the choice of leadership styles or behaviours in workplace situations: Leadership skills and development, Assignment, UOA, UK
- ATHE Level 7 Unit 5 : You Have Been A Senior Manager For Several Years And Have Decided That Your Next Career Move Should Be To Take Responsibility: Personal Development for Leadership and Strategic Management Assignment, UK
- You are required to prepare a 5-year strategy review to shareholders for evaluating the business simulation: 5-year strategy review to shareholders, Report, UOEL, UK
- CMI Unit 502: Approaches to achieving a balance of skills and experience in a team: Principles of Developing, Managing and Leading Individuals and Teams, Assignment, UK
- CMI Unit 502: Principles of Developing, Managing and Leading Individuals and Teams, Assignment, UK
- UNIT-701: How the principles of strategic leadership can be applied to respond to complex organisational challenges: Strategic Leadership, Assignment, CMI, UK
- UNIT- 701: The leadership behaviours and skills required to deliver strategic goals: Strategic Leadership, Assignment, CMI, UK
- UNIT- 701: Understanding of how the organisational context influences management and leadership practice: Strategic Leadership, Assignment, CMI, UK
- Evaluate the concept of evidence-based practice and assess how approaches to evidence-based practice: Evidence - based practices, Report, UOH, UK