you are expected to perform security exploits specified in this document and design a strategic… 1 answer below »

Even the smartest students need writing assistance at some point during their academic career. Should you lock yourself in a room and spend the entire weekend trying to write a paper? We promise you that the paper that you pay for won’t be resold or submitted elsewhere. It will also be written according to the instructions that you and your professor provide. Our excellent essays stand out among the rest for a reason. Don’t just take our word, check them out by yourself.


Order a Similar Paper Order a Different Paper

In this assignment, you are expected to perform security exploits specified in this document

and design a strategic plan to improve the system security for a remote system, firstly using

the available tools from BackTrack/Kali and GNU/Linux distribution, and a deliberately

insecure web application – WebGoat v8(https://github.com/WebGoat/WebGoat). The

JDK v11 with Java Virtual Machine (https://www.java.com/en/download/) is required to

run WebGoat.Meanwhile, you can download BackTrack and any appropriate (free and

open-source) tools (e.g. Wireshark) provided by practical labs or from the tools vendor’s

official website to complete this assignment. The only difference is the official websites

will provide the latest released version with some new features and revision but maybe not

stable. It is your choice to work on which version that is suited for your computer OS and

hardware environments. There are no limitations on either Mac, Linux or Windows etc.

NOTE: You are not to use any commercial security-related or hacking products

for this assignment.

There are two parts to this assignment:

• Part A will require you finish the “Challenges” in the WebGoat, while it is to

test your understanding of a particular adversary attack and how to counter that

exploit.

• Part B will require the research work on IDS/IPS, Firewall & Honeypot.

In Part A, you are required to answer the questions with justifiable implementations.

These implementations need to be documented in detail. The document must have stepby-step details on what you did to solve the question, including any script codes used

to answer the requirements. You are also required to provide images (screen dumps) to

show the key steps leading to your solution. These images can be taken using printscreen or any other screen capture method. These images must be embedded in the

document with appropriate labelling and descriptions.

In Part B, you need to address the given research questions on the IDS, Firewalls and

Honeypot.

In addition, the document format shall be neatly organised and have the proper heading

and subheading for the marker’s easy marking process. It is suggested to clearly indicate

which part and what question you are attempting to complete. It is suggested to clearly

indicate the stage your solution is used for.

Attachments:

Writerbay.net

Do you need help with this or a different assignment? In a world where academic success does not come without efforts, we do our best to provide the most proficient and capable essay writing service. After all, impressing professors shouldn’t be hard, we make that possible. If you decide to make your order on our website, you will get 15 % off your first order. You only need to indicate the discount code GET15.


Order a Similar Paper Order a Different Paper