Skip to main content
留学咨询

辅导案例-COMP3006

By May 15, 2020No Comments

School of Computer Science – Coursework Issue Sheet Session 2019/20 Semester 2 Module Name Computer Security Code COMP3006 Module Convenor(s) (CW Convenor in Bold) Michael Pound Coursework Name Portfolio of Lab Work Weight 40% Deliverable (a brief description of what is to be handed-in; e.g. ‘software’, ‘report’, ‘presentation’, etc.) Written report Format (summary of the technical format of deliverable, e.g. “C source code as zip file”, “pdf file, 2000 word max”, “ppt file, 10 slides max”, etc.) 2000 word pdf submitted via moodle Issue Date March 19th Submission Date Wednesday May 26th Submission Mechanism Via Moodle Late Policy (University of Nottingham default will apply, if blank) Students are responsible for ensuring that they inform the University of any circumstances that they consider are affecting their ability to study and/or undertake assessments as early as possible. Please see your Student Handbook on Moodle for further information on the University’s extenuating circumstances procedure. Late submissions will be subject to the University’s policy regarding late submissions of assessed work, unless an extenuating circumstances claim has been approved. Feedback Date By 12th June Feedback Mechanism Written feedback via moodle. Instructions Instructions will be released on moodle. Assessment Criteria • Submissions will be assessed numerically, from 0 to 100% • The main assessment criteria for the report are: – Correctness – Is what you have written technically correct? – Analysis – Have you justified your decisions with background knowledge? – Completeness – Have you explored as many aspects of the subject as possible? – Presentation – Is the report well written? G53SEC COURSEWORK 2019/2020 DEADLINE: 26TH MAY INTRODUCTION This coursework requires you to write a detailed report, of up to 2000 words, that covers aspects of computer security you will have encountered in the labs and lectures. Marks will be awarded for the correctness and completeness of your answers, have you explored each topic in enough depth, and is what you have written about technically correct. For top marks, any additional knowledge or insight beyond what I have told you would demonstrate that you really understand the concepts. QUESTION 1: PASSWORDS For this question you are expected to write up to 500 words. A system administrator has asked you to design a new password and authentication policy for their network, and justify your choices. Given your experiences in the password labs and lectures, what password policy would you advise? In other words, what rules would you enforce on users for their passwords? These rules could involve constraints on the passwords, password use, expiration etc. Would you recommend any additional authentication measures, and in which cases? How would you suggest storing the passwords? Bear in mind that this policy would be rolled out to many users, so must be realistic as well as robust. Be sure to explain the reasoning behind each suggestion. QUESTION 2: FIREWALLS In this question you are expected to write up to 500 words. It has become commonplace to use permitted services such as SSH to “tunnel” traffic that would otherwise be blocked by a network firewall. Give some examples of reasons an administrator might choose to block ports from normal traffic. Describe in detail how a protocol such as SSH can be used to circumvent firewall restrictions. Give an example of a time when someone might use SSH tunneling for a perfectly legitimate reason, and one where someone might use it for more disreputable purposes. QUESTION 3: SERVER SECURITY This question requires you to write up to 1000 words. During lab 7 you scanned and accessed a vulnerable server, and then worked to improve its security. Describe in detail what actions you performed, and why, and what actions you would perform if you had more time. Which services did you install or remove? What configurations did you change? And so on. As you can imagine, there are countless things you could do to this machine to improve security, try to perform or describe as many as you feel is reasonable to secure it. Many marks are available here for detail and justifications of your actions, but given you have 1000 words, try to priorities the critical vulnerabilities first. In some cases (e.g. distribution upgrades) it is acceptable to say what you would have done given more time, but feel free to perform these actions if you wish.

admin

Author admin

More posts by admin