{"id":10241,"date":"2024-02-28T21:22:33","date_gmt":"2024-02-28T10:22:33","guid":{"rendered":"https:\/\/casestudyhelp.com\/sample-questions\/?p=10241"},"modified":"2024-02-28T21:29:22","modified_gmt":"2024-02-28T10:29:22","slug":"cnt5007-cyber-security-tools-and-applications-assignment-solutions","status":"publish","type":"post","link":"https:\/\/casestudyhelp.com\/sample-questions\/cnt5007-cyber-security-tools-and-applications-assignment-solutions\/","title":{"rendered":"CNT5007 Cyber Security Tools and Applications Assignment Solutions"},"content":{"rendered":"<h2><strong>Comprehensive Analysis of Network Security<\/strong><\/h2>\n<p><strong>Assessment Details:<\/strong><\/p>\n<p><strong>Words: 3000<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Learning outcomes covered<\/span><\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>LO 01\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Examine the usage of various file systems<\/p>\n<p>LO 02\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Choose correctly available low-level tools and applications used to analyse digital storage media.<\/p>\n<p>LO 03\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Evaluate network protocol features that made them vulnerable.<\/p>\n<p>LO 04\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Apply appropriate low-level tools to analyse network traffic data.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Looking for CNT5007 Cyber Security Tools and Applications Assignment Solutions? Get <a href=\"https:\/\/casestudyhelp.com\/au\/\" target=\"_blank\"><strong>Assignment Help<\/strong><\/a> on the CNT5007 Course &amp; Module from a subject matter expert with 100% plagiarism-free work. We provide <strong><a href=\"https:\/\/casestudyhelp.com\/sample-questions\/\" target=\"_blank\">assignment answers<\/a><\/strong> related to all Academic subjects like (MBA, Nursing, Business, Law, Marketing, Economics, Finance and others).<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<h2><strong><span style=\"text-decoration: underline;\">Scenario:<\/span><\/strong><\/h2>\n<p style=\"text-align: justify;\">Hope Hospitals (PVT) Ltd is an emerging private sector health service provider. The latest key feature that they expect to add to their repertoire is the availability of online services for the patients. Online consultation, medical report issuance, and e-channeling are going to be a few of such services. In addition, all the patients will be given a user login to the database of the hospital where the information of each has been saved. The online medicine and medical items purchasing platform is expected to be another popular feature of Hope Hospitals.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Before launching the platform for the public, the hospital&#8217;s management has decided to conduct a comprehensive security analysis and obtain a report to identify the possible loopholes in the platform that the intruders could exploit.<\/p>\n<p style=\"text-align: justify;\">As the Chief Information Security Officer of Hope Hospitals (PVT) Ltd, you have been asked to prepare a report on the level of security of your current set-up by carrying out a security analysis.<\/p>\n<p style=\"text-align: justify;\"><strong>Also Read: <a href=\"https:\/\/casestudyhelp.com\/sample-questions\/case-study-solutions-on-information-technology\/\" target=\"_blank\">Case Study Solutions on Information Technology<\/a><\/strong><\/p>\n<h3><strong><span style=\"text-decoration: underline;\">CNT5007 Task 01<\/span><\/strong><\/h3>\n<p style=\"text-align: justify;\">The management of Hope Hospitals (Pvt) Ltd is varied on a suitable file system that should be utilized to provide folder and file security along with built-in compression and encryption. The network environment will be based on the MS Windows client and server operating systems. Consider different file systems available and select and explain the reason for selecting the best-suited file system that would provide the features the management is looking for.\u00a0<strong>(LO 01)<\/strong><\/p>\n<p style=\"text-align: right;\"><strong>(20 Marks)<\/strong><\/p>\n<h3><strong><span style=\"text-decoration: underline;\">CNT5007 Task 02<\/span><\/strong><\/h3>\n<p style=\"text-align: justify;\">The report should include vulnerability assessment, scanning and other relevant tests, and the digital storage analysis, which must be stated in the final report.<\/p>\n<p>The report should be comprised of the following. <strong>(LO 02, LO 04)<\/strong><\/p>\n<ol>\n<li>The tools and the applications used to carry out the relevant assessments and analysis, including screenshots of the implementation of those tools where<\/li>\n<li>Use suitable tools and applications to perform the analysis of network traffic by providing the relevant screenshots.<\/li>\n<\/ol>\n<p style=\"text-align: right;\"><strong>(60 Marks)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong><span style=\"text-decoration: underline;\">CNT5007\u00a0<\/span>Task 03<\/strong><\/h3>\n<p style=\"text-align: justify;\">The administrator of the hospital&#8217;s network requested that you make him aware of different network protocols that would bring vulnerabilities to a network due to their respective features and countermeasures that could be taken against them. Make a list of such protocols used in networks, their vulnerabilities and the countermeasures against them to make the network administrator aware. <strong>(LO 03)<\/strong><\/p>\n<p style=\"text-align: right;\"><strong>(20 Marks)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>For REF&#8230; Use:\u00a0<span style=\"text-decoration: underline; color: #808000;\">#getanswers2002622<\/span><\/strong><\/p>\n<script type=\"text\/javascript\" charset=\"utf-8\" src=\"http:\/\/w.sharethis.com\/widget\/?wp=6.2.9\"><\/script>","protected":false},"excerpt":{"rendered":"<p>Comprehensive Analysis of Network Security Assessment Details: Words: 3000 &nbsp; Learning outcomes covered \u00a0 LO 01\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Examine the usage of various file systems LO 02\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Choose correctly available low-level tools and applications used to analyse digital storage media. LO 03\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Evaluate network protocol features that made them vulnerable. LO [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2775],"tags":[],"_links":{"self":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts\/10241"}],"collection":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/comments?post=10241"}],"version-history":[{"count":3,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts\/10241\/revisions"}],"predecessor-version":[{"id":10244,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/posts\/10241\/revisions\/10244"}],"wp:attachment":[{"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/media?parent=10241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/categories?post=10241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/casestudyhelp.com\/sample-questions\/wp-json\/wp\/v2\/tags?post=10241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}