logo

Cyber Security - Identification of threats

   

Added on  2022-08-12

16 Pages1865 Words20 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author’s Note

1
CYBER SECURITY
Task 1: List of threats
Identification of threats
For the identification of threats, a scan is performed on the local area network using nmap
for identifying the IP address of the host and it is used for targeting the machine for finding the
open ports and performing a vulnerability scan (Carr 2016). An SQL injection attack can be
performed on finding open ports on the targeted machine and getting access of the information
residing in the database of the server.
Network Sniffer
Nmap is used for gathering information from the network and identifying the number of host and
their IP address connected with the network.

2
CYBER SECURITY
Port Scanner
The following screenshot shows port scanning of a targeted machine in the network and
the service running on the ports.
System log analysis
The log analysis is performed by capturing packets from the network using wireshark and
identifying the source and destination of the data packets flowing in the network (Backes et al.
2017). The details of the machine can also be found from the packet capture and used for
security log analysis.

3
CYBER SECURITY
Auditing
Asset Threat Loss Countermeasure
Equipment Theft: (brief scenario e.g. Dr Evil
comes through the unlocked
window)
Logitech wireless
keyboard
Install Alarm, hire
guards, landmines etc.
Equipment Fire: catching of fire in case of Server, data Use of fire alarm and

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment | Cyber Security
|23
|2174
|14

Analysis of Host Discovery Assignment 2022
|22
|1377
|21

Ethical Hacking & Countermeasures Report 2022
|25
|3747
|46

Web Application Set-up Assignment 2022
|13
|1511
|15

Reflective Critical Analysis | Web Application Security
|5
|1203
|10

Security Assessment on a Firewall
|11
|891
|145