3
Steps to Get a Perfectly Written Assignment
One
Click “order this assignment now”
Two
Choose your deadline & pay for it
Three
Get custom-written work ready for submission

Custom-Written, AI & Plagiarism-Free with Passing "Guaranteed"

money back guarantee
Assignment Briefs 05-21-2023

LO3: Demonstrate the use of some complex penetration testing and active defence tools

Postgraduate Programmes Assignment Specification

Faculty of Science and Engineering Department of Computer Science

Module No

CO7607

Module Title

Penetration Testing and Active Defence

Academic Year

2022-23

Assessment No

Component 2 (30%)

Submission Date

Feedback due by

Assignment Title

Coursework

Learning Objectives Assessed

LO3: Demonstrate the use of some complex penetration testing and active defence tools

LO6: Discuss the need for and uses of active defence

LO7: Critically evaluate and analyse active defence techniques

Submission Information

The final submission shall be 1400 words (with ± 10% flexibility) report of all exercises, submitted as a Word or PDF document to Moodle via a submission link on the CO7607 Moodle page. 5 marks penalty per 1000 words excess will apply – e.g., if a 1000-word assignment, 5 marks deducted for 1101-2100 words).

 

 

 

 

Introduction

Assignment Brief

This assessment is to test your general knowledge of active defence and hands-on understanding of relevant offensive countermeasures tools.

1. Offensive Countermeasures (OCM) and Tools

OCM generally helps us to defend ourselves against attackers and in the process, enables us to get a better understanding of who is attacking us and why. The general categories of OCM are Annoyance, Attribution and Attack.

Briefly research and explain, in your own words, each of these three OCM categories. Your discussion should include explanation of the category, its goal and how it can be accomplished. You may use examples. [10 marks]

Demonstrate the use of any three OCM tools, one for each OCM category. For each tool, identify

the OCM category it belongs to. Explain the tool, what it is used for, how it can be used in a particular

case example scenario and then demonstrate its use. Set up and use any two virtual machines

(VMs) in which one plays the role of a target and the other plays the role of the attacker. Configure

and execute the tool as required. Use relevant screenshots, from both VMs, to document and explain

the exercise.

 

Note that while you can easily grab and use screenshots from online, it is totally unacceptable and would be in breach of the academic integrity policy – DO NOT do that. What is most important here is clearly showing your understanding of how these tools work and scenarios where they can be used. Unexplained screenshots will attract little or no marks. It is not sufficient to dump screenshots without adequately explaining them to show understanding of what is going on. Your work MUST provide evidence that you have run the tools yourself, as opposed to having taken images from another sources. Where relevant, you must change your terminal prompt to include your J number in the host name. [60 marks]

2. OCM General

OCM, especially the idea of hack back or self-defence in cyber security, has been a very controversial concept. There are legal challenges on one hand and moral argument on the other. There are those who say that we should not hack back under any circumstances while others believe that we need to take some sort of actions against the attacker if we must have upper hand in the fight.

Research and discuss the current UK legislation or legal status relating to OCM. Your discussion should cover the following:

  • Whether there is/are any existing specific legislation
  • What you think is the general view on how the law on self-defence in cyberspace should be designed [30 marks]

NOTE: You must use proper APA referencing to acknowledge all your sources. The nature of this assessment means that you will be conducting brief research and using/adapting existing tools and materials. You are advised to present points in your own words/understanding and then reference as relevant.

General Instructions

  • Format: The format should be one column, left or justified alignment, have appropriate and meaningful headings/sections. Use a meaningful structure that ensures coherency.
  • Referencing: Do not just give a list of references without showing where/how you have used them in the text – ensure you include in-text referencing. See the citethemright referencing tutorial for a guide – login with your university account. We use APA 7th edition.
  • Support: If you use external support, e.g., for proofreading or translation, you MUST state this. The tutor will provide adequate support to ensure that all students are very clear of what is expected of them in this assessment. So, ensure you take this opportunity to get clarifications where you need them.
  • Coverage: You are expected to address ALL aspects as identified in this brief. LO3: Demonstrate the use of some complex penetration testing and active defence tools
  • Originality: It is acceptable to use direct quotes from sources. However, excessive use of direct quotes (regardless of whether they are referenced or not) reduces the originality of the work. This and high level of similarity will affect the student’s mark.
  • Viva may be necessary to “test the student’s knowledge of the work that has been submitted”. Where this happens, it is a continuation of the assessment.

Assessment Criteria

Marks will be affected if the above instructions are not adhered to. As stated above, specific marks are allocated to questions and the level of marks awarded will depend on the depth and quality of answers. Characteristics of Distinction and Pass level answers are distinguished as below:

Distinction marks will be awarded for:

  • Demonstrating in-depth knowledge of the skills tested
  • Coverage – attempting and getting most or all of the tasks correct
  • Showing excellent knowledge of the topic area
  • Excellent command, understanding, and usage of relevant tools
  • A very sophisticated critical reflection, self-evaluation and new insights informing practical situations.
  • Proper use of referencing

Pass marks will be awarded for:

  • Demonstrating extensive knowledge of the skills tested
  • Coverage – attempting and getting most of the tasks correct
  • Showing good knowledge of the topic area
  • Sound command, understanding, and usage of relevant tools
  • A sound critical reflection, self-evaluation and some new insights informing practical situations
  • Proper use of referencing
  • LO3: Demonstrate the use of some complex penetration testing and active defence tools

Answers that fall below the above criteria will receive a fail mark.

100% Plagiarism Free & Custom Written, Tailored to your instructions
paypal checkout

Our Giveaways

Plagiarism Report

for £20 Free

Formatting

for £12 Free

Title page

for £10 Free

Bibliography

for £18 Free

Outline

for £9 Free

Limitless Amendments

for £14 Free

Get all these features for
£83.00 FREE

STILL NOT CONVINCED?

Have a look at our samples which are written by our professional writers to give you an insight into how your work is going to look like. We have added some essays, coursework, assignments as well as dissertations.

View Our Samples

Apr Sun 2024

Produce an Information Security Risk Ass

CASE STUDY Tasks a) Produce an Information Security Risk Assessment for the...

Apr Sun 2024

LO1: Effectively communicate a structure

 Integrated Health and Social Care Leadership and Entrepreneurship in Heal...

Apr Sat 2024

LO1 Conduct the preliminary stages invol

Higher National Assessment Designed in accordance with HEA guidelines ...