VU21990_AE_Pro_2of3 (1)

docx

School

TAFE NSW - Sydney Institute *

*We aren’t endorsed by this school

Course

22334VIC

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

10

Uploaded by MegaIceFlamingo6004

Report
Project assessment: Cyber security attacks and techniques Criteria Unit code, name and release number VU21990 Recognise the need for cyber security in an organisation Qualification/Course code, name and release number 22334VIC Certificate IV in Cyber Security Student details Student number Student name Assessment Declaration This assessment is my original work and no part of it has been copied from any other source except where due acknowledgement is made. No part of this assessment has been written for me by any other person except where such collaboration has been authorised by the assessor concerned. I understand that plagiarism is the presentation of the work, idea or creation of another person as though it is your own. Plagiarism occurs when the origin of the material used is not appropriately cited. No part of this assessment is plagiarised. Document title: VU21990_AE_Pro_2of3 Page 1 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Student signature and Date Document title: VU21990_AE_Pro_2of3 Page 2 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Version: 1.0 Date created: 18 December 2018 Date modified: 15 January 2019 For queries, please contact: Technology and Business Services SkillsPoint Ultimo © 2018 TAFE NSW, Sydney RTO Provider Number 90003 | CRICOS Provider Code: 00591E This assessment can be found in the: Learning Bank The contents in this document is copyright © TAFE NSW 2018, and should not be reproduced without the permission of the TAFE NSW. Information contained in this document is correct at time of printing: 19 February 2020. For current information please refer to our website or your teacher as appropriate. Document title: VU21990_AE_Pro_2of3 Page 3 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessment instructions Table 1 Assessment instructions Assessment details Instructions Assessment overview The objective of this assessment is to assess your knowledge and performance to identify common and emerging cyber security attacks and techniques. Assessment Event number 2 of 3 Instructions for this assessment This is a project-based assessment and will be assessing you on your knowledge and performance of the unit. This assessment is in two parts and includes an Assessment feedback form: 1. Attacks and techniques presentation 2. Assessment checklist 3. Assessment feedback Submission instructions On completion of this assessment, you are required to upload it or hand it to your assessor for marking. Save your files with the event name and your own name, for example: Event1_john_smith . Ensure you have written your name at the bottom of each page of your assessment. Submit the following documents for each part: Part 1 o Presentation file o A screen recording or link to recording. It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment. Check Assessment checklist to ensure that you’ve covered all the required tasks. What do I need to do to To achieve a satisfactory result for this assessment all questions must Document title: VU21990_AE_Pro_2of3 Page 4 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
achieve a satisfactory result? be answered correctly. What do I need to provide? USB drive or other storage method to save work to A personal computer with internet access Screen recording software. Download using these instructions ( e.g. https://obsproject.com/download ) What will the assessor provide? Access to the Learning Management System Scenario documents as outlined in assessment Due date and time allowed Indicative time to complete: Part 1: 3 hours Assessment feedback, review or appeals Appeals are addressed in accordance with Every Student’s Guide to Assessment. Document title: VU21990_AE_Pro_2of3 Page 5 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Specific task instructions You are required to create and record a presentation based on this scenario . Part 1: Attacks and techniques presentation Using the DataTrust presentation template , create a presentation based on the scenario (minimum 10 minutes). Record your presentation using screen recording software – refer to these instructions for help with screen recordings and video. Your presentation must address the following headings and content: 1. Threats Describe and provide a minimum of three examples for each of the following: Threat actors Threat vectors Threat goals. 2. Current trends Identify and describe trends in cyber attacks, including the impact of cyber threat vectors. 3. Untargeted and targeted attacks List and provide at least one example for each of the categories of vulnerabilities used in: untargeted cyber attacks targeted cyber attacks. 4. Malware attacks Demonstrate and describe how malware exploits un-patched systems. To do this you must use your existing antivirus package, or download and install an antivirus software solution of your choice (many free or trial antivirus packages are available). You will also need to download the EICAR simulated virus file, which is available for download from https://www.eicar.org and place it in one of your user folders (Downloads/My Documents/etc.) Note: This is a simulated virus file, it will not actually infect or cause damage to your system. You should run your antivirus solution to scan your system and provide appropriate description and screenshots to show: how the antivirus solution scans the system the detection of the EICAR ‘virus’ by your antivirus solution a description of the file Document title: VU21990_AE_Pro_2of3 Page 6 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
how the antivirus solution deals with the detected threat (quarantine/recommendations/etc.) typical infection methods for ransomware style virus or malware. 5. Attacks against network perimeter and end users Describe techniques used by attackers to infiltrate and escalate privileges. Include techniques that attack the perimeter as well as end users. 6. Wireless vulnerabilities Describe one example of how wireless WPA2 can be hacked. 7. IoT security issues 1. What is IoT? Describe at least three different examples of IoT devices. 2. Demonstrate the use of any IoT device to perform a specific task of your choice (eg turn on a light globe with mobile app, or record talking to a smart speaker). Provide appropriate screenshots or recording if required. If you don’t have access of any IoT device then use Cisco Packet Tracer v7.2 and complete the task by using a simulated IoT device. For Packet Tracer, log in to www.netacad.com then scroll down to the Packet Tracer download link (currently in the initial log in screen). 3. Describe specific vulnerabilities of IoT devices including issues with: o device used in the previous question o lack of updates o patching IoT devices. Document title: VU21990_AE_Pro_2of3 Page 7 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Part 2: Assessment checklist The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions about the submission (if appropriate) directly after the task has been submitted. TASK/STEP # Instructions S U/S Assessor Comments Part 1.1 Presentation is created in presentation software with supplied DataTrust presentation template . Screen recording software can be found with these instructions . Defines threat actors, threat vectors and threat goals. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Part 1.2 Describes trends in cyber attacks. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Part 1.3 Describes examples of untargeted and targeted cyber attacks. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Part 1.4 Describes and demonstrates techniques used by malware to attack and infect systems. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the Document title: VU21990_AE_Pro_2of3 Page 8 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
criteria. Part 1.5 Describes and demonstrates techniques used by attackers to infiltrate and escalate privileges (including the perimeter and end users). Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Part 1.6 Describes and demonstrates how wireless WPA2 can be hacked. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Part 1.7 Describes at least three different IoT devices, with examples. Demonstrates the use of a consumer grade router as an IoT device. Describes vulnerabilities of IoT devices. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Document title: VU21990_AE_Pro_2of3 Page 9 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessment feedback NOTE: This section must have the assessor signature and student signature to complete the feedback. Assessment outcome Satisfactory Unsatisfactory Assessor feedback Was the assessment event successfully completed? If no, was the resubmission/re-assessment successfully completed? Was reasonable adjustment in place for this assessment event? If yes, ensure it is detailed on the assessment document. Comments: Assessor name, signature and date: Student acknowledgement of assessment outcome Would you like to make any comments about this assessment? Student name, signature and date NOTE: Make sure you have written your name at the bottom of each page of your submission before attaching the cover sheet and submitting to your assessor for marking. Document title: VU21990_AE_Pro_2of3 Page 10 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_2of3 STUDENT NAME: YENENEW SHUMALEM MEKONEN