0% found this document useful (0 votes)
94 views

DT249-4 Assignment 2

Over the last two decades, security has become one of the most important issues for organizations. While operating systems provide basic security, they are not enough to meet higher standards of confidentiality, integrity, and availability. As a result, many security tools have been developed to provide additional protection. However, some tools have malicious purposes or their legality is unclear. This document assigns a report on security tools, requiring research on tools for footprinting, analyzing Kali Linux, capturing wireless traffic, enforcing passwords, and discussing legal issues. A 5000-word report with screenshots is due by December 18, 2015.

Uploaded by

John
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

DT249-4 Assignment 2

Over the last two decades, security has become one of the most important issues for organizations. While operating systems provide basic security, they are not enough to meet higher standards of confidentiality, integrity, and availability. As a result, many security tools have been developed to provide additional protection. However, some tools have malicious purposes or their legality is unclear. This document assigns a report on security tools, requiring research on tools for footprinting, analyzing Kali Linux, capturing wireless traffic, enforcing passwords, and discussing legal issues. A 5000-word report with screenshots is due by December 18, 2015.

Uploaded by

John
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Security and Cryptography DT249-4

Over the last two decades security has become one of the most important issues in the
Information Communication Technology landscape of most organisations. Organisations
need security in order to ensure that their information processing systems are reliable.
While Operating Systems provide some primitive security services, these are not enough
to organisations expected to maintain a higher standard of data confidentiality, integrity
and availability. Therefore, we have been witnessing a proliferation of security tools
which provide additional security services to the information processing systems. Most of
these security tools are used for checking and reporting the state of the systems and in
some cases solving identified problems. Some security tools go a step further in the sense
that they have sinister motives of deceiving users. We have reached a stage where it is
extremely difficult to determine if the use of a particular security tool is legal or not. To
make matters interesting legislators are busy making laws that react to public opinion and
in some cases without a lot of thought on their implications to end users and developers.
Therefore, even using some of the security tools for research is as uncertain as hackers
seem to be with the law.
In this assignment you will be required to research the following: (and write a report
about your research result)
1. Identify one security tool which is used in order to detect operating systems,
sessions, hostnames, open ports etc for footprinting . 20%
2. The Kali https://www.kali.org/ (or similar software package) and investigate
the use security tools it provides. You will be required to demonstrate the
work of two security tools of your choose in your report. 40%
3. Identify one security tool which are used to capture wireless network
traffic 15%
4. Discuss programs are current exsiting in the market which are used to enforce
password. 15%
5. Discussing issues in your report, such as the impact of laws in the use of
security tools in this assignment. 10%
Each team will be required to submit the research report before 18:00 of the 18th
December 2015.
The report should not be more then 5000 words, screen shot must be included.
References
1. http://www.defeatingthehacker.com/chapter.htm, (last accessed 9th October 2014)
2. http://www.securityfocus.com/, (last accessed 9th October 2014)
3. http://sectools.org/, (last accessed 9th October 2014).
4. http://www.security-database.com/toolswatch/, (last accessed 9th October 2014).
5. http://exploitsearch.com/, (last accessed 9th October 2014).
6. http://securitytube.net/Default.aspx, (last accessed 9th December 2012).
7. Peter Sommer, Criminalising hacking tools, Digital Investigation 3(2): 68-72 (2006)

You might also like