{"id":6651,"date":"2024-11-20T13:08:47","date_gmt":"2024-11-20T13:08:47","guid":{"rendered":"https:\/\/assignmenttask.com\/answers\/?p=6651"},"modified":"2024-11-20T13:09:42","modified_gmt":"2024-11-20T13:09:42","slug":"cyber-security-tools-and-applications-coursework-assignment","status":"publish","type":"post","link":"https:\/\/assignmenttask.com\/answers\/cyber-security-tools-and-applications-coursework-assignment\/","title":{"rendered":"Cyber Security Tools and Applications Coursework Assignment"},"content":{"rendered":"<p><strong>Assignment Details:-<\/strong><\/p>\n<ul>\n<li><strong>Topic:<\/strong> Cyber Security Tools and Applications<\/li>\n<li><strong>Document Type:<\/strong> Coursework<\/li>\n<li><strong>Number of Words:<\/strong> 3000<\/li>\n<li><strong>Citation\/Referencing Style:<\/strong> Harvard<\/li>\n<\/ul>\n<h2 style=\"text-align: center;\"><strong>Cyber Security Tools and Applications<\/strong><\/h2>\n<h3><strong>Learning Outcomes Covered<\/strong><\/h3>\n<p>LO 01: Examine the usage of various file systems<\/p>\n<p>LO 02: Choose correctly on available low-level tools and applications used to analyse digital storage media.<\/p>\n<p>LO 03: Evaluate network protocol features which made them vulnerable<\/p>\n<p>LO 04: Apply appropriate low-level tools to analyse network traffic data.<\/p>\n<h3><strong>Scenario<\/strong><\/h3>\n<p>Hope Hospitals (pvt) Ltd is an emerging private sector health service provider. The latest key feature that they expect to add into their repertoire is the availability of online services for the patients. Online consultation, medical report issuance, e-channeling are going to be few of such services. In addition, all the patients will be given with user log in to the database of the hospital where the information of each has been saved. The online medicine and medical items purchasing platform is expected to be another popular feature of Hope Hospitals<\/p>\n<p>Before launching the platform for the public the management of the hospital has decided to conduct a comprehensive security analysis and obtain a report to identify the possible loopholes in the platform which could be exploited by the intruders.<\/p>\n<p>As the Chief Information Security Officer of Hope Hospitals (pvt) Ltd you have been asked to prepare a report on the level of security of your current set up by carrying out a security analysis<\/p>\n<h3><strong><u>Task 01<\/u><\/strong><\/h3>\n<p>The management of Hope Hospitals (pvt) Ltd is varied on a suitable file system that should be utilized to provide the folder and file security along with built in compression and encryption and the network environment will be based on the MS Windows client and server operating systems.. Consider different file systems available and select and explain the reason for your selection of the best suited file system which would provide the features that the management is looking for. <strong>(LO 01)<\/strong><\/p>\n<h3><strong><u>Task 02<\/u><\/strong><\/h3>\n<p>The report should be included with vulnerability assessment, scanning and other relevant tests together with the digital storage analysis which have to be stated in the final report<\/p>\n<p>The report should be comprised of the following. <strong>(LO 02, LO 04)<\/strong><\/p>\n<ol>\n<li>The tools and the applications used to carry out the relevant assessments and analysis including screenshots of the implementation of those tools where appropriate.<\/li>\n<li>Use suitable tools and applications to perform the analysis of network traffic by providing the relevant screenshots.<\/li>\n<\/ol>\n<h3><strong><u>Task 03<\/u><\/strong><\/h3>\n<p>The administrator of the network of the hospital requested you to make him aware on different network protocols which would bring vulnerabilities to a network due their respective features and countermeasures that could be taken against them. Make a list of such protocols used in networks, their vulnerabilities and the countermeasures against them to make the network administrator aware. <strong>(LO 03)<\/strong><\/p>\n<blockquote><p><em>Need <a href=\"https:\/\/assignmenttask.com\/coursework\/\" target=\"_blank\" rel=\"noopener\"><strong>help with coursework writing<\/strong><\/a>? Get an A+ assured grade with the Cyber Security Tools and Applications Coursework Assignment. We have professional academic writers who are well-qualified and experienced in the field. We deliver the <a href=\"https:\/\/assignmenttask.com\/services\/\" target=\"_blank\" rel=\"noopener\"><strong>best assignment help services<\/strong><\/a> at a reasonable cost. If you\u2019re thinking, <a href=\"https:\/\/assignmenttask.com\/do-my-homework-for-me\/\" target=\"_blank\" rel=\"noopener\"><strong>do my homework for me<\/strong><\/a>, we are here to assist you. You can pay our expert writers for original and high-quality assignment services.<\/em><\/p><\/blockquote>\n<p><a href=\"https:\/\/assignmenttask.com\/order-now.php\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-1261 size-full lazyload\" title=\"Order Now\" data-src=\"https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment.jpg\" alt=\"Order-Your-Assignment\" width=\"600\" height=\"150\" data-srcset=\"https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment.jpg 600w, https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment-300x75.jpg 300w, https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment-360x90.jpg 360w\" data-sizes=\"(max-width: 600px) 100vw, 600px\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/150;\" \/><noscript><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-1261 size-full\" title=\"Order Now\" src=\"https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment.jpg\" alt=\"Order-Your-Assignment\" width=\"600\" height=\"150\" srcset=\"https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment.jpg 600w, https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment-300x75.jpg 300w, https:\/\/assignmenttask.com\/answers\/wp-content\/uploads\/2019\/04\/Order-Your-Assignment-360x90.jpg 360w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/noscript><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assignment Details:- Topic: Cyber Security Tools and Applications Document Type: Coursework Number of Words: 3000 Citation\/Referencing Style: Harvard Cyber Security Tools and Applications Learning Outcomes Covered LO 01: Examine the usage of various file systems LO 02: Choose correctly on available low-level tools and applications used to analyse digital storage media. LO 03: Evaluate network protocol features which made them vulnerable LO 04: Apply appropriate low-level tools to analyse network traffic data. Scenario Hope Hospitals (pvt) Ltd is an emerging private sector health service provider. The latest key feature that they expect to add into their repertoire is the availability <a href=\"https:\/\/assignmenttask.com\/answers\/cyber-security-tools-and-applications-coursework-assignment\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5922],"tags":[],"_links":{"self":[{"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/posts\/6651"}],"collection":[{"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/comments?post=6651"}],"version-history":[{"count":1,"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/posts\/6651\/revisions"}],"predecessor-version":[{"id":6652,"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/posts\/6651\/revisions\/6652"}],"wp:attachment":[{"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/media?parent=6651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/categories?post=6651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/assignmenttask.com\/answers\/wp-json\/wp\/v2\/tags?post=6651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}