logo

Assignment | Cyber Security

Individual assignment based on the given scenario

23 Pages2174 Words14 Views
   

Added on  2022-08-29

Assignment | Cyber Security

Individual assignment based on the given scenario

   Added on 2022-08-29

ShareRelated Documents
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author Note
Assignment | Cyber Security_1
CYBER SECURITY 1
Table of Contents
Task 1:........................................................................................................................................2
List of threats:..........................................................................................................................12
Task 2.......................................................................................................................................15
Background:.........................................................................................................................15
Purpose:................................................................................................................................15
Scope:...................................................................................................................................15
Roles and Responsibilites:...................................................................................................15
Policy Framework:...............................................................................................................16
Distribution, Training and Implementation:........................................................................17
Monitoring, Feedback and Reporting:.................................................................................18
Business Continuity:............................................................................................................20
References:...............................................................................................................................21
Assignment | Cyber Security_2
CYBER SECURITY 2
Task 1:
Setting up VMs (Kali Linux and Windows 10):
IP config Kali machine:
Assignment | Cyber Security_3
CYBER SECURITY 3
IP config windows machine:
Assignment | Cyber Security_4
CYBER SECURITY 4
Both the machines are connected via NAT network.
Ping connection:
Assignment | Cyber Security_5
CYBER SECURITY 5
Pinging connection between the systems to make sure that the connection has been
established.
Port scanning via NMAP:
Assignment | Cyber Security_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
THREE KEY AREAS FOR FUTURE EXPLORATION.
|1
|292
|182

Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1749
|483

Network Security & Its Vulnerabilities | Document
|9
|1749
|130

Student. 27 October 2016. FUTURE EXPLORATION. Student.
|4
|350
|196