Write My Paper Button

WhatsApp Widget

As a cybersecurity expert, you may be required to provide training to staff. To make  this ‘authentic’ you have been asked to design and build a vulnerable system that can be

Assessment Information 

As a cybersecurity expert, you may be required to provide training to staff. To make  this ‘authentic’ you have been asked to design and build a vulnerable system that can be used to demonstrate different cyber-attacks/ethical hacks. Starting from the  provided network in NetLab select a potential attack to demonstrate the issues.

Completion of this assessment will address the following learning outcomes:

1). Critically evaluate the requirements for penetration testing and ethical  hacking.
2). Design security assessment experiments to expose security vulnerabilities.
3). Critically evaluate resulting data from security assessment experiments to  recommend remedial actions.
4). Critically appraise the role of security testing within the wider context of  continuous security improvements to the information             assurance processes  within an organisation.