0% found this document useful (0 votes)
11 views

Assignment 5

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Assignment 5

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Introduction to computer network: ICT-1202 – Sem1 2024-2025

Name: Mohamed Saleh Alseiari


ID No:M00009189

Assignment 5 Date:

Assignment 5 – Research Network Security Threats

Objectives

Part A: Explore the SANS Website


Part B: Identify Recent Network Security Threats
Part C: Detail a Specific Network Security Threat

Background / Scenario

To defend a network against attacks, an administrator must identify external threats that
pose a danger to the network. Security websites can be used to identify emerging threats
and provide mitigation options for defending a network.
One of the most popular and trusted sites for defending against computer and network
security threats is SysAdmin, Audit, Network, Security (SANS). The SANS site provides
multiple resources, including a list of the top 20 Critical Security Controls for Effective Cyber
Defense and the weekly @Risk: The Consensus Security Alert newsletter. This newsletter
details new network attacks and vulnerabilities.
In this assignment, you will navigate to and explore the SANS site, use the SANS site to
identify recent network security threats, research other websites that identify threats, and
research and present the details about a specific network attack.

Required Resources

 Device with internet access


 Presentation computer with PowerPoint or other presentation software installed

Instructions

Part A. Exploring the SANS Website


In Part 1, navigate to the SANS website, and join by creating your account (use an active
email since you will be receiving an E-Mail Verification, check Junk and Spam after creating
your account for the E-Mail Verification). Explore the available resources.
Introduction to computer network: ICT-1202 – Sem1 2024-2025
Name: Mohamed Saleh Alseiari
ID No:M00009189

Assignment 5 Date:

Step 1. Locate SANS resources.


Search the internet for SANS. From the SANS home page, click on FREE Resources.
Question:
List three available resources.

Reading Room, Webcasts, Newsletters.


Step 2. Search for the CIS Critical Security Controls.
The CIS Critical Security Controls linked on the SANS website are the culmination of a
public-private partnership involving the Department of Defense (DoD), the National Security
Association, the Center for Internet Security (CIS), and the SANS Institute. The list was
developed to prioritize the cyber security controls and spending for DoD. It has become the
centerpiece for effective security programs for the United States government. From the
Search menu, write 20 Critical Security Controls, register for the webcast, and Download
Presentation Slide, which provides a brief description of each control.
Question:
Select one of the Controls and list implementation suggestions for this control.

Critical Control 5: Malware Defenses. Employ automated tools to continuously


monitor workstations, servers, and mobile devices. Employ anti-malware software
and signature auto-update features. Configure network computers to not auto-run
content from removable media.
Step 3. Locate the Newsletters menu.
Question:
Highlight the Resources menu and select Newsletters. Briefly describe each of the three newsletters
available.

SANS NewsBites is an annotated, semiweekly executive summary of the most recent and
important cybersecurity news headlines.

@RISK provides a reliable weekly summary of newly discovered attack vectors, vulnerabilities
with active new exploits, insightful explanations of how recent attacks worked, and other
valuable data.

OUCH! is the world's leading, free security awareness newsletter designed for the common
computer user.

Published every month and in multiple languages, each edition is carefully researched and
developed by the SANS Securing The Human team, SANS instructor subject matter experts,
Introduction to computer network: ICT-1202 – Sem1 2024-2025
Name: Mohamed Saleh Alseiari
ID No:M00009189

Assignment 5 Date:

and team members of the community. Each issue focuses on and explains a specific topic and
actionable steps people can take to protect themselves, their family and their organization.

Part B. Identify Recent Network Security Threats


In Part 2, you will research recent network security threats using the SANS site and identify
other sites containing security threat information.
Step 1. Locate the @Risk: Consensus Security Alert Newsletter Archive.
From the Newsletters page, select @RISK. In SANS @RISK select a recent weekly
newsletter named The Consensus Security Vulnerability Alert. Review the Notable
Recent Security Issues and Most Popular Malware Files sections.
Question:
List some recent vulnerabilities. Browse multiple recent newsletters, if necessary.

Step 2. Identify sites providing recent security threat information.


Questions:
Besides the SANS site, identify some other websites that provide recent security threat information.
Type your answers here.
List some of the recent security threats detailed on these websites.
Type your answers here.

Part3. Detail a Specific Network Security Attack


In Part 3, you will research a specific network attack that has occurred. Complete the form below
based on your findings.
Step 1. Complete the following form for the selected network attack.
Name of attack:

Type of attack:

Dates of attacks:

Computers / Organizations
affected:

How it works and what it did:


Introduction to computer network: ICT-1202 – Sem1 2024-2025
Name: Mohamed Saleh Alseiari
ID No:M00009189

Assignment 5 Date:

Mitigation options:

References and info links:

Reflection Questions

1. What steps can you take to protect your own computer?


Type your answers here.
2. What are some important steps that organizations can take to protect their resources?
Type your answers here.
End of Document

Assessment: St_Name: --------------------------------------- ID:------------


NOTE:
Provide screenshots where applicable. Make sure you answer all the questions. Each question has
marks.
Answers will vary. You must explain in your own words. A plagiarism checker will be enabled. Duplicates
will be penalized with 0 marks.

Step Max. Marks Awarded Marks


Part A 1 2
2 4
3 6
Part B 1 4
2 4
Part C 1 6
Reflection Question 4
Total 30
Introduction to computer network: ICT-1202 – Sem1 2024-2025
Name: Mohamed Saleh Alseiari
ID No:M00009189

Assignment 5 Date:

You might also like