Whatsapp for any query: +44 7830 683702 / +91 9777 141233 / +61 489 987 481

cyber security Homework Help |

cyber security Assignment Help

Boost your journey with 24/7 access to skilled experts, offering unmatched cyber security homework help

Frequently Asked Questions

Q. 1)    Examine the YouTube video "What is the Cyber Kill Chain?" included in Week 5's Readings and Instructional Material section before answering this question. • How can you incorporate the ideas presented in this video into a broader plan for cybersecurity and cyber resilience? • In your opinion, what procedures, instruments, and methods would be most useful for identifying and stopping a cyberattack in its tracks? Threats, vulnerabilities, and the management procedures required to handle them within the cybersecurity and cyber resilience plan are the main topics of this week's chapter in the course textbook. Chapter 4 (Siegel and Sweeney 2020): Cyberthreats, Vulnerabilities, and Intelligence Analysis @zhClg4cLemc%20 https://www.youtube.com/watch?

Q. 2)    Implementing a Secure Password Storage System (20 marks) Design a system to securely store user passwords in a database. The passwords should be hashed and salted before storing. Use a secure hashing algorithm such as bcrypt, PBKDF2, or Argon2. Implement a method to verify the user's password when they log in. Ensure that the password hash is never exposed in any logs or error messages. Discuss the importance of salting and hashing in password security.

Q. 3)    Designing a Secure Login System with Two-Factor Authentication (20 marks) Implement a login system with two-factor authentication (2FA) for enhanced security.Use TOTP (Time-Based One-Time Password) or an SMS-based system for the second factor. Implement backend logic for handling 2FA challenges and tokens. Explain the security benefits of 2FA and the potential risks if it is not implemented properly.

Q. 4)    Network Security: Firewalls and IDS/IPS Configuration (20 marks) Design a basic network security plan for a small company, including the use of firewalls, IDS (Intrusion Detection Systems), and IPS (Intrusion Prevention Systems).Discuss how to configure firewalls to allow only essential traffic to the network. Describe how IDS/IPS works and the difference between them. Identify potential vulnerabilities and recommend best practices for securing the network infrastructure.

Q. 5)    Cryptography: Implementing AES Encryption (20 marks) Implement AES (Advanced Encryption Standard) encryption in Python (or any programming language of your choice). Encrypt and decrypt a message using a key and IV (Initialization Vector). Discuss the advantages and limitations of AES encryption. Explain how to securely manage the encryption key and IV.

Q. 6)    Write a secure login form and backend code that prevents SQL injection attacks. Explain how SQL injection works and how to prevent it using parameterized queries or ORM (Object-Relational Mapping). Implement a simple form where a user submits a username and password, and the backend queries a database for validation. Discuss other web application security best practices such as XSS (Cross-Site Scripting) and CSRF (Cross-Site Request Forgery).

Q. 7)    Perform a threat modeling exercise for a simple web application. Identify and describe possible attack vectors (e.g., phishing, DoS, cross-site scripting). Create a risk assessment matrix to prioritize the threats based on likelihood and impact. Suggest mitigation strategies for each identified threat. Include an explanation of how threat modeling helps in building secure applications.

Q. 8)    Capture and analyze network traffic using Wireshark for suspicious activity. Use Wireshark to capture packets from a network and filter for HTTP or HTTPS traffic. Look for signs of suspicious activity, such as unencrypted credentials or unusual patterns. Discuss the role of packet sniffing in cybersecurity and its legal and ethical implications.

Q. 9)    Develop a cybersecurity policy for a small business or organization. Include sections on password management, employee training, incident response, and data encryption. Discuss the importance of having a clear cybersecurity policy to protect organizational assets and sensitive data. Include best practices for regular audits and employee compliance.

Key Facts

Some Key Facts About Us

11

Years Experience

100

Team Members

10000

Satisfied Clients

500000

Completed Projects

Boost Your Grades Today!

Fill out the form,