Friday, December 25, 2009

Task 03 -- Virus Attacks

Question 3 – Virus attacks (5 marks)

Complete Case Project 2-1, page 76. Report your findings in your blog.


Answer 3


Along the development of computer technology the development of its destruction stuff which is known as virus are also being repidly developed. one after another millions of viruses have been discovered which destroys the computer data, inofrmation and can even crash the system and boot sector as well.


The latest information regarding current viruses:


SeverityNameTypeProtected*
W32.Qakbot!gen1Trojan, Virus, Worm12/24/2009
W32.SillyFDC.BDHWorm12/23/2009
W32.NoobertVirus, Worm12/22/2009
Bloodhound.Exploit.313 Trojan, Virus, Worm12/21/2009

FileExecSecurity Assessment Tool12/21/2009

SysDefenceMisleading Application12/18/2009
Packed.Generic.275Trojan, Virus, Worm12/18/2009
Bloodhound.Exploit.312 Trojan, Virus, Worm12/18/2009
Trojan.Gord Trojan12/17/2009


Reference:

symantec corporation (1995-2009) http://www.symantec.com/business/security_response/threatexplorer/index.jsp, extracted on 22/12/2009




Recently discovered viruses by the McAfee

Threat Activity


Recent Threats Information with name type risk date discovered
Name Type DAT Risk Date Discovered
PWS-Nemqe.dll!1b8decd9d516 Trojan 5842 Low 12/23/2009
AdClicker-BJ!DB57F91EA980 Trojan 5791 N/A 12/23/2009
JS/Redirector.b Trojan 5836 Low-Profiled 12/17/2009
PatchedSFC Program 5831 N/A 12/17/2009
Generic.dx!iuf Trojan 5835 Low 12/17/2009
FakeAlert-KW Trojan 5835 Low-Profiled 12/17/2009
Exploit-PDF.ag Trojan 5834 Low-Profiled 12/15/2009
ProcKill-FD Trojan 5834 Low 12/15/2009
BackDoor-DOQ.gen.y Trojan 5830 Low-Profiled 12/11/2009
Generic.dx!htp Trojan 5827 Low 12/9/2009
W32/Sdbot.worm!fn Virus 5827 Low 12/9/2009
FakeAlert-DefenceLab Trojan 5829 Low-Profiled 12/9/2009
BackDoor-AWQ.b!bvb Trojan 5827 Low 12/9/2009
OSX/iPHSponey.A Program 5826 Low-Profiled 12/4/2009
Generic Dropper!bir!0181eb37fc26 Trojan 5821 Low 12/3/2009
Generic PWS.y!bhd Trojan 5821 Low 12/3/2009
Ransom-O Trojan 5819 Low 12/2/2009
Generic Downloader.x!bur Trojan 5817 Low 11/29/2009
FakeAlert-SpyPro Trojan 5817 Low 11/29/2009
Generic.dx!hhx Trojan 5816 Low 11/28/2009
Generic Downloader.x!46485cd1ea1c Trojan 5813 Low 11/25/2009
Generic Dropper!3443e72e04d4 Trojan 5813 Low 11/25/2009
Generic BackDoor!0c90dc700e85 Trojan 5813 Low 11/25/2009
Generic PWS.y!642ca194dfed Trojan 5813 Low 11/25/2009
Generic.dx!e085af882b30 Trojan 5813 Low 11/25/2009
FakeAlert-JU!a427fe051b61 Trojan 5813 Low 11/25/2009
W32/Fujacks.ay!rootkit Malware 5814 Low-Profiled 11/25/2009
Downloader.gen.a!5e30399cfdaa Trojan 5813 Low 11/25/2009
BackDoor-EIF!8d9d49af6468 Trojan 5812 Low 11/24/2009
BackDoor-EIF!9f4ebb31c4a1 Trojan 5812 Low 11/24/2009


Reference:


McAfee corporation (2003-2009). http://home.mcafee.com/VirusInfo/ThreatActivity.aspx , viewed on 22-12-2009


The latest attack by the viruses.

------Computer virus attack at Pentagon

THE US military has banned the use of flash drives and DVDs on its computers as it tries to combat a virus spreading rapidly through its networks.

The Pentagon ordered an unprecedented ban on all external hardware but refused to comment on the source of the attack, saying such information was classified.

"We have detected a global virus for which there has been alerts, and we have seen some of this on our networks," a Pentagon official told Fox News.

Full details on :

http://www.news.com.au/computer-virus-attack-on-pentagon/story-0-1111118102184


-----Twitter hacked, attacker claims Iran link

A COMPUTER hacker briefly hijacked Twitter.com on Friday, redirecting users to a website and claiming to represent a group calling itself the Iranian Cyber Army.


Details on:

http://www.theaustralian.com.au/australian-it/twitter-hacked-attacker-claims-iran-link/story-e6frgakx-1225812345024



----What platforms are the most vulnerable?

The mostly used platform is known to be Windows, so by the research and study also it shows the computer having Operating System as Windows are more chances to be affected by the virus.




What type of damage can the virus do?
The virus can damage the file, disk drives, boot sector of drives, system crash,etc.
There are various type of virus as the it is connected with intention.
Virus can damage the whole system, which interrupts the office works , personnel works,



Task 04-- Anti virus software

Question 4 – Anti virus software (5 marks)

Complete project 3-2, page 111. Provide screenshots of steps 4, 6, 7, 12, 13, 18. Ensure you answer the questions in steps 6, 7, 12, 13, 18. Provide a description of each step.

Answer 4:

(Step 04)

Enter the URL www.eicar.org/anti_virus_test_file.htm in the web broswer for which screenshot has been provided


(Step 06)

Click on the eicar.com which normally download the file into the computer.

My antivirus software didn't detect this file as the virus at this point, it normally download and have been saved into the folder.


(Step07)

Click on the eicar_com.zip file

By clicking , the zip file has been downloaded into my computer without any notification in the download folder of google chrome download folder


(Step 12)

To scan the downloaded file for virus, I went to download folder then on the file named as eicar_com.zip, the antivirus result shown me that there are 2 virus in this file.


(Step 13)

I again downloaded the double compressed zip file named as eicarcom2.zip, the file has been downloaded without nay virus notification from the antivirus software


(Step 18)

Here, while scanning the double-compressed ZIP file for virus , my Antivirus prgram shown me that there are 3 infection in this file now.






Task 02 - Keylogger

Question 2 – Keylogger (5 marks)

Install and use a keylogger as shown in Project 2-2, page 71. Provide screenshots of steps 1, 4, 6, 11, 14. Answer question in step 14. Also answer this question: how would you attempt to install a keylogger to a computer for which you did not know a user name and password?


Answer 2

Keyboard Collector is the process of capturing all the action of keyboard in the form of log.

There are various types of these kind of programs, one of them is "SpyBoss Pro" which even log every action of the computer as like the web site that has been browsed and the contents of its pages and the log can be viewed in the form of text format or in the program it self.

(Step01)

The following is the Google search page in which the Keyboard collector is being searched in the following way


(Step 04)

To run the following program , go to Start and Run the SpyBoss Pro program, the following figure is the interface page of the program, where many function are available


(Step 06)

To activate the key logger program we have to click on the button "Start Capture" button, after clicking , it ask for the file name to be labelled for log file name in order for future reference and to ease of search


(Step 11)

After capturing to view the saved log file, we can directly click on Open Log button on the left hand side of the SpyBoss Pro or by directly click on the text file of the desired date and name as saved before. There is even more additional way to view the log which is very interactive style which can be acquired by clicking on Playback button which shows all the log in very interactive way.


(Step 14)

To view all the programs that are currently running, Click the Applications tab on the Windows Task Manager

The reason of the screenshot being used is to show that the Keyboard controller or keylogger or SpyBoss Pro would not appear in the Application tab, because it works at the background , its main theme is for security or hacking reasons which has to be made hidden in order to log the every action that has been used by the user of any type.

Hackers use these kind of program to find out the desired information in order to attack the site, to make unauthorised access and for various reason and on the other hand System and Security Administrator uses such kind of programs for security reason. This is the reason that itwon't appear in the Application tab of Task manager.


In case we don't have the authentication data like username and password, in the graphical mode it is not possible but if we can access the particular computer in the command propmt i any case we can install the key logger program by use of Command program.












Task1 --Google Reconnaissance

Question 1 – Google Reconnaissance (5 marks)

Complete project 1-2, page 31 from the text book. Take screenshots of steps 4, 5, 6, 7. Take 2 more screenshots that display the contents of documents that expose account names. Provide a description of each screenshot.


Answer 1

(Step 04)

Google (www.google.com) is the most powerful search engine in the web technology which is widely used every second by everypart of the world with its multi-linguistic option. In this task today, I'm going to test some of the advanced search features of the google.com, in which I'm trying to search the search with keyword of "login:*" "password=" with the file type Microsoft excel (.xls).

Below is the screen shot for the following task.



(Step 05)

Clicking the above Advance Search option button, we get the following results (weblinks)

and clicking one of the weblinks , the Microsoft excel (.xls) desired files appear in which all the login name and password has been listed in the spreadsheet



(Step 06)

Now below is the Advanced Search page which is look for the a text file which contains a list of password in the cleartext. but this time the keyword has been typed as "index.of passlist" and filetype selected as Any type. The screenshot is just posted here,

Clicking the Advanced Search Button the following weblink/webpages has been published by the google search engine , following is the resultant web pages


(Step 07)

Clicking upon one of the weblink/webpages in the above resultant Google page, we get the following information in the clear text format which again helps us to find the specific clear text format.

The Google search engine is developing day by day, many personnel are in the research to make it more powerful to make the searching more easier and enjoyable.


Tuesday, December 8, 2009

ITC 358 Sub Outline

Study Centre Sydney


INTERNAL SUBJECT OUTLINE
2010-10


ITC358-Network Security



Subject Lecturer Peter Dalmaris

Email: pdalmaris@gmail.com


Lecture Wednesday
1-5pm
Lab16



Tutorials The weekly instruction in this subject will consist of a combined lecture /tutorial lasting up to 4 hours which will occur every Wednesday. This will cover the main points from each topic.


Consultation To be advised


The information in this study package has been adapted from the original materials provided by Charles Sturt University. Contact information, assessment items and due dates may have been changed with the approval of the Charles Sturt University subject convenor so that they better fit the specific situation of the local partner.


ITC358
Network Security
Faculty of Business
Subject Outline
2010-10

*ITC358*




Network Security
ITC358 Subject Outline
Faculty of Business

Subject lecturer
Peter Dalmaris

Session offering
Summer Session 2010 (30 Nov 2009-18 Feb 2010)




Produced by the Division of Learning and Teaching Services, Charles Sturt University, Albury - Bathurst - Wagga Wagga, New South Wales, Australia.

Published May 2009
Mailing Information
This subject has one mailing consisting of:
Readings
Subject Outline
















Printed at Charles Sturt University
© Charles Sturt University
Previously published material in this book is copied on behalf of Charles Sturt University pursuant to Part VB of the Commonwealth Copyright Act 1968

Contents

ITC358 Network Security.................................................................................... 6
Subject details....................................................................................................... 6
Resources............................................................................................................. 7
Subject requirements............................................................................................. 9
Subject delivery................................................................................................... 11
Assessment details.............................................................................................. 13
Appendices......................................................................................................... 24
ITC358 Network Security
Welcome
Welcome to a new session of study at Charles Sturt University, Study Centre Sydney. This subject informs students of aspects of security relating to the operation and management of information technology infrastructure. The subject covers managerial and technical aspects of information security and provides a practical insight into information technology security practices.
Your subject lecturer
Peter Dalmaris

Peter holds a PhD in knowledge management and business process management. He also hold a Bachelor degree in Electrical and Computer Engineering, a Master in Engineering and Information Systems and a Master of Science. You can contact Peter via email at pdalmaris@gmail.com.
Contact procedures
Academic enquiries
Any questions concerning the teaching of this subject can be made by contacting your subject lecturer.
Email:
pdalmaris@gmail.com
University policies and regulations
Academic matters are defined by, and are subject to, Charles Sturt University policies and regulations. Your Subject Outline should be read in conjunction with all such academic regulations and policies, as some of these may affect the outcome of your studies.
At the beginning of the session, information regarding some of these specific regulations and policies will be posted to your eBox at my.csu.
Subject details
Learning objectives
Upon successful completion of this subject, students should:
· be able to describe various types of threats that exist for computers and networks;
· be able to define the basic terminology associated with computer and information security;
· be able to describe the various physical security components used to protect computers and networks;
· be able to identify methods used to attack information security systems;
· be able to list techniques to enhance information security;
· be able to recognise basic cryptography techniques;
· be able to explain the components and use of a public key infrastructure;
· be able to identify the different types of devices used to secure a network;
· be able to compare and contrast the effectiveness of various firewall architecture;
· be able to define virtual private networks and describe their security aspects;
· be able to describe the security implications of wireless networks;
· be able to outline the role and features of intrusion detection systems;
· be able to apply methods of hardening network infrastructure;
· be able to describe various types of network and computer attacks;
· be able to list security aspects of applications such as email and web services; and
· be able to outline aspects of security policies and risk management techniques.


Resources
CSU Interact is the University's online learning environment. It contains your subjects with a range of learning services or tools that you will be able to explore. You can access CSU Interact via http://my.csu.edu.au
The learning resources for this subject consist of:
Subject Outline
Readings
Prescribed text(s)
Ciampa, M. (2009). Security+ guide to network security fundamentals (3rd ed.). Canada: Course Technology.
Required reading
Reading 1: Pfleeger, C. P., & Pfleeger, S.L. (2007). Elementary cryptography. In Security in computing (4th ed. pp. 37-97). Upper Saddle River NJ: Prentice Hall.
Reading 2: Stallings, W. (2006). Firewalls. In Cryptography and network security: Principles and practices (4th ed. pp. 621-634). Upper Saddle River NJ: Prentice Hall.
Reading 3: Campbell, P., Calvert, B., & Boswell, S. (2003). E-mail. In Security+ guide to network security fundamentals (pp. 123-151). Canada: Thomson
Reading 4: Maiwald, E. (2004). Virtual private networks. In Fundamentals of network security (pp. 285-310). Burr Ridge, IL: McGraw-Hill.
Reading 5: Thomas, T. (2004). Router security. In Network security first-step (pp. 189-230). Indianapolis, IN: Cisco Press.
Reading 6: Geier, J. (2005). Wireless network security. In Wireless networks first-step. (pp. 171-200). Indianapolis, IN: Cisco Press.
Reading 7: Kaufman, C., Perlman, R., & Speciner, M. (2002). IPSec: AH and ESP. In Network security (2nd ed., pp. 423-439). Upper Saddle River, NJ: Prentice Hall.
Reading 8: Slay, J., & Koronios, A. (2006). The Australian ethical, legal and standards framework. In Information technology security & risk management. (pp. 67-100). Milton Qld: Wiley.
Electronic communication
A range of information and services concerning this subject is accessible through your personalised area (my.csu) of Charles Sturt University's web site at the following URL:
http://my.csu.edu.au
my.csu is a secure (password-protected) web site that enhances navigation of the University's online environment. It brings together information that relates to you. For example, Personal Details provides your textbook lists, examination timetables, academic transcripts and examination results, finance balances, and direct access to online subjects and forums. This web site also contains your eBox where official University communications will be sent, e.g. HECS information, messages from the Vice-Chancellor. Every distance education subject offered has an online Subject Outline. This outline links to learning resources and services available to assist you with the subject. These services include direct access to the:
· internet links and resources relevant to your subject;
· online subject forum which provides you with an opportunity to engage in discussion with your subject coordinator and other students enrolled in the subject;
· subject email address that allows you to contact your subject coordinator;
· and library, allowing you to search for subject information and resources.
Please note that due to the dynamic nature of the World Wide Web, some web sites may have been moved or links may have become inactive. Your assistance in reporting new, moved and inactive web sites through your subject forum is appreciated.
Library services
The Library website provides access to print and online material, such as books, reports, journals, articles, dissertations, newspapers, and other reference tools. You will also find guides and assistance to help you use the Library's resources.
http://www.csu.edu.au/division/library/
Contact details are:
Study Centre Sydney (02) 9291 9300
Library Help
Answers to your frequently asked questions about Library services and resources are available at:
http://www.csu.edu.au/division/library/how-to/faq/
Library skills tutorials
InfoSkills@CSU is a self-paced, interactive, online tutorial which teaches core research skills such as using library databases and the library catalogue. It incorporates a number of exercises and quizzes to test your understanding. It is modular and can be done in any order at any time. InfoSkills@CSU is located on the Library website (go to 'How to use the library' and 'Library skills tutorial') or can be accessed directly at:
http://www.web-ezy.com/csuweb-ezy/
How to contact the Library
Phone
1800 808 369 (free call from within Australia)
Online Ask
A Question
http://csu.altarama.com/reft100.aspx?key=Ask&ref=120
Library Forum
http://forums.csu.edu.au/perl/forums.pl?forum_id=Library_Services_forum&task=frameset
Library contacts
http://www.csu.edu.au/division/library/about/contacts/
Subject requirements
Pass/fail requirements
To pass this subject you must achieve an overall mark of 50% in the combined Assessments 1 & 2 total as well as a mark of 50% in the exam.
Plagiarism
It is unfair to honest students that other students cheat or plagiarise. Charles Sturt University takes a serious view of plagiarism and cheating in any form of assessment, and will take appropriate steps to detect plagiarism including using electronic plagiarism detectors.
Plagiarism consists of a person using the words or ideas of another as if they were his or her own. That is, using, or attempting to use, another person's work without acknowledgement. The important message here is that if you use the work of another person then it must be acknowledged. The phrase "using another person's work" includes, but is not limited to:
· using study guide material without acknowledgement;
· paraphrasing the work of another person;
· directly copying any part of another person's work;
· summarising the work of another person;
· using or developing an idea or theme derived from another person's work;
· using experimental results obtained from another person's work; and
· in the collaborative projects, falsely representing the individual contributions of the collaborating students where individual contributions are to be identified.
Other forms of cheating will also be treated with the utmost seriousness. The university reserves the right to electronically scan students' assessments for the purposes of verifying originality.
Penalties for plagiarism are listed in the Academic Regulations under the Student Academic Misconduct Rule. The penalties include: a caution or reprimand; awarding of zero marks in the assignment, essay, project, test, examination or other work in respect of which academic misconduct has occurred; a fail in the subject; a fine; suspended enrolment; or exclusion from the University.
The Faculty of Business has acquired computer software which can link electronic or scanned assessments to online data to accurately detect plagiarism. The software can also detect situations when students submit assessments which include the work of other students. The software system used by the Faculty is called "Turnitin". The Faculty reserves the right to require submission of assessments in electronic form. More details of this software can be found at the following web sites:
http://www.turnitin.com/
http://www.turnitin.com/static/products_services/plagiarism_prevention.html
Please note that we would much prefer to encourage students to submit assessments which clearly acknowledge sources rather than to detect plagiarism and to impose penalties. Recent penalties applied to plagiarism have included automatic failure and suspension from the University.
A guide to the APA style of referencing (the style now used by the Faculty of Business) is available at: http://www.csu.edu.au/division/studserv/learning/pdfs/apa2008.pdf
Further details on how to reference and avoid unintentional plagiarism can be found at the Student Services website. http://www.csu.edu.au/division/studserv/learning/referencing
Subject delivery
Schedule
Week
Topic
Readings
1
Topic 1: Introduction to information security
Text Chapter 1
2
Topic 2: Cryptography
Text Chapter 11 and Reading 1
3
Topic 3: Systems threats and Countermeasures
Text Chapter 2 & 3
4
Topic 4: Secure communication
Reading 2 & 3
Assessment item 1 due
5
Topic 5: Network Vulnerabilities and Attacks Topic 6: Network Defences
Text Chapter 4
Text Chapter 5
6
Topic 7: Virtual Private Networks

7
Topic 8: Wireless Network Security
Text Chapter 6 & Reading 6
8
Topic 9: Access Control Fundamentals & Authentication
Text Chapter 7 & 8
Assessment item 2 due
9
Topic 10: IP Security
Topic 11: Vulnerability Assessment and Security Audits
Reading 7
Text Chapter 9 & 10
10
Topic 12: Security Policies and Training
Text Chapter 14 & Reading 8

Exam Period

Online forum participation
All CSU online subjects have forums which are accessible through the CSU Interact online learning environment. Details regarding how these will be utilised during a teaching session should be provided within the 'Teaching and support strategies' section of the subject outline, or on the forum itself.
Submission of assessment tasks
It is recommended that your name and your student number be included in the header or footer of every page of any assignment.

Charles Start University has a centralized assignment receipt centre located at reception. All assignments should be accompanied by a completed assignment cover sheet. Reception only accepts assignments up to 5pm each week day.

You will have the assignment receipt handed to you stamped and signed, this must be kept as proof of submission.

Faxed/emailed assessment tasks
The Faculty of Business has resolved not to accept faxed or emailed assessment tasks under any circumstances.
Assessment task return
You should normally expect your marked assessment tasks to be despatched to you within three weeks of the due date, if your assessment task was submitted on time. If an assessment task is submitted on time but not returned by the return date, you should make enquiries in the first instance to the subject coordinator.
Academic learning skills assistance
Visit the learning skills website for advice about assignment preparation, academic reading and notetaking, referencing, and preparing for exams at:
http://www.csu.edu.au/division/studserv/learning
You may also contact:

Dr Susan Lee
Study Support Officer
Phone: 02 9291 9337
E-mail: S.Lee@sga.edu.au
For appointments, please see Reception.
Queries regarding the content of this subject should be directed to your subject lecturer.
Subject evaluation surveys
It is University policy that all subjects are evaluated every time that they are offered. The University's Division of Learning and Teaching Services administers surveys through the Online Evaluation Survey System. Staff in the faculties and schools value your feedback very highly and take account of your comments when reviewing learning and teaching in each subject. If you are interested in the details of any enhancements to this subject as a result of the latest survey, please contact the subject coordinator.
Surveys for each of the subjects you are enrolled in for this session will be available for you to complete for a period of 4 weeks from the last week of the teaching session. An email message will alert you to the availability of the surveys online.
Please complete the subject evaluation by following the link:
http://online.csu.edu.au/evaluations/
Individual subject results are reported to the subject coordinator and Heads of Schools after grades have been submitted for each teaching session (except where subjects have one student the results are not reported to staff). The aggregated results for subjects are available within 3 weeks of the release of grades. They can be accessed online at:
http://www.csu.edu.au/division/landt/evalunit/evaluation_online.htm
Variations to Subject Outlines
Should it be necessary to change the content of the Subject Outline during a teaching session, it will be done in consultation with the Head of School and other support services of the University. You then will be notified of the changes in writing by the subject coordinator.
Assessment details
Due dates
Item no.
Description
Value
Due date*
Return date**
Cover sheet required
1
Assessment 1: Questions
20%
Monday 24 August 2009
Monday 14 September 2009
Yes
2
Assessment 2: Questions
20%
Monday 19 October 2009
Monday 9 November 2009
Yes
3
Assessment 3: Examination
60%
Exam period
(16-27 November 2009)

No

*
due date is the last date for assessment items to be received at the University

**
applies only to assessment items submitted by the due date
Extensions and late submission of assessments
Requests for extensions will be considered on a case-by-case basis. Reasons such as illness may require evidence of a medical certificate. Reasons such as work pressures will not suffice. The majority of students face the same pressures of prioritising work and family commitments.
The penalty for late submission of an assessment without obtaining the subject coordinator's approval for an extension will be 10% deduction per day including weekends, of the maximum marks allocated for the assignment, i.e. 1 day late - 10% deduction, or 2 days late - 20% deduction.
For example, for an assignment worth 20 marks, the calculation depending on the penalty given are as follows:
Marks received (before penalty)
18 marks
Less 1 day late penalty
2 marks
Student's final mark
16 marks
Marks received (before penalty)
18 marks
Less 2 days late penalty
4 marks
Student's final mark
14 marks

Any difficulty that you have during the session should, in the first instance at least, be dealt with by your subject coordinator.
Assessment item 1: Questions
Due date:
Monday 24 August 2009
Value:
20%
Marks:
Each question in this assessment has a value of 5 marks.
Length:
There is no minimum or maximum number of words set for this assessment item. However, it is expected that answers to questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. See the CSU guide to APA at http://www.csu.edu.au/division/studserv/learning/referencing/index.htm
Rationale:
The rational for this assignment is for you to demonstrate your understanding of protocols used in network security and encryption methods, use security-related tools, and diagnose the capability of a computer to protect itself.
Instructions:
Post your answers on your personal blog. Use one post for each question. Provide supporting references at the end of each post entry.
Question 1 – Google Reconnaissance (5 marks)
Complete project 1-2, page 31 from the text book. Take screenshots of steps 4, 5, 6, 7. Take 2 more screenshots that display the contents of documents that expose account names. Provide a description of each screenshot.
Question 2 – Keylogger (5 marks)
Install and use a keylogger as shown in Project 2-2, page 71. Provide screenshots of steps 1, 4, 6, 11, 14. Answer question in step 14. Also answer this question: how would you attempt to install a keylogger to a computer for which you did not know a user name and password?
Question 3 – Virus attacks (5 marks)
Complete Case Project 2-1, page 76. Report your findings in your blog.
Question 4 – Anti virus software (5 marks)
Complete project 3-2, page 111. Provide screenshots of steps 4, 6, 7, 12, 13, 18. Ensure you answer the questions in steps 6, 7, 12, 13, 18. Provide a description of each step.
Assessment item 2: Questions
Due date:
Monday 19 October 2009
Value:
20%
Length:
There is no minimum or maximum number of words set for this assessment item. However, it is expected that answers to questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. See the CSU guide to APA at http://www.csu.edu.au/division/studserv/learning/referencing/index.htm
Rationale:
The rational for this assignment is for you to demonstrate your understanding of protocols used in network security and encryption methods, use security-related tools, and diagnose the capability of a computer to protect itself.
Instructions:
Post your answers on your personal blog. Use one post for each question. Provide supporting references at the end of each post entry.
Question 1 – Wireshark (5 marks)
Complete Project 4-1, page 148. Provide screenshots of steps 1, 6, 7, 8, 9, 14. What is happening in steps 7 and 8? How can you prevent Wireshark capturing these data?
Question 2 – Cryptography (5 marks)
Project 11-1, page 394. Provide screenshots of steps 1, 5, 6, 9, 10, 11, 12, 13, 14. Answer the two questions in step 14.
Complete Case Project 11.1, page 398.
Question 3 – Wireless security (5 marks)
1. Complete Project 6-3. Provide screenshots of steps 1, 7, 9, 11, 13, 14.
2. Complete Case Project 6-3.
Question 4 – Vulnerability scanners (5 marks)
Complete Project 9-2, page 9. Provide screenshots of steps 1, 3, 5, 6, 10, 13, 15, 17. Answer question in step 17.
Assessment item 3: Examination
Due date:
Examination period
Value:
60%
Length:
2 hours
Exam type:
Closed book


Appendices
Sample exam

TEsT01

Hi all,
This is my first blog