Skip to main content

You should experiment with the software and demonstrate that you

CO4509 – Computer Security
Referral – Linux Security
Martin Bateman
mbateman@uclan.ac.uk
July 9, 2018
Due date: 13th August 2018 11:59pm
Weighting: 0.5
Size: 3000 words, 12 pages including diagrams
Assignment Description
Requirements
You should investigate and provide short reports (as individuals not groups) on
the following
SELinux1
iptables2
Bro3
You should experiment with the software and demonstrate that you have
understood their configuration and associated configuration files. You will be
expected to find sources of information.
Your report should include
A brief description of each of the system you setup.
A description of the results obtained.
A proposal, with justifications of which of the systems you would use to
aid in securing a small business network.
1https://ift.tt/1betTi1
2https://ift.tt/14TJy3Q
3http://www.bro.org/
1
Learning Outcomes
2. Propose and justify suitable security for a networked computer system
3. Use a range of security-related tools
4. Critically evaluate tools and techniques for system security
6. Research and report on a security-related topic, using appropriate
literature
Submission
The assignment work should be submitted as a Word document (.docx) or
Portable Document Format (.pdf) to the appropriate assignment submission
slot on Blackboard
4 before 11:59pm on the 13th August 2018.
Penalties for late submission
There is no opportunity for late submission for this assignment. A late submission will automatically be awarded 0%.
Extenuating circumstances
If you believe that there are circumstances that justify an extension of the
hand-in deadline for assignment work, you are required to use the Extenuating Circumstances forms. Extensions (to a maximum of 10 working days) are
granted when there are serious and exceptional factors outside your control.
Everyday occurrences such as colds and hay fever do not normally qualify for
extensions. Where possible, requests for extensions should be made before the
hand-in date.
The School considers extenuating circumstances to be conditions that significantly impact on your work. Typically these will cover more than one module.
Requests for consideration of extenuating circumstances in respect of assignment work submission, should be made using the MyUCLan
5. You are advised
to speak to your Academic Advisor prior to submitting. Whilst extenuating
circumstances are being considered, you are advised to inform relevant staff
members, and continue with the assignment.
Feedback
Feedback will be given to the class within 15 working days of the assignment
hand-in date. This may be done in the first 15 minutes of a lecture. This will be
4https://ift.tt/2AqvESS
5https://ift.tt/2Ou6dm8
2
followed by individual written feedback tying to the Learning Outcomes listed
in the assignment brief, together with any additional helpful feedback such as
areas of strength and areas for improvement.
Plagiarism
The University operates an electronic plagiarism detection service where your
work may be uploaded, stored and cross-referenced against other material. You
should be aware that the software searches the World Wide Web, an extensive
databases of reference material and work submitted by members of the same
class to identify duplication.
For detailed information on the procedures relating to plagiarism, please see
the current version of the University Academic Regulations
6.
Reassessment and Revision
There is no possibility for reassessment of this assignment.
6https://ift.tt/2ArVAgX regulations.php
3
4 Assessment criteria

The post You should experiment with the software and demonstrate that you appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM