Access Control Firewall Assessment (Miss Professor only)

Access Control Firewall Assessment

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft.
  5. Disable port traffic for torrent applications.
  6. Disable inbound ICMP protocol.
  7. Choose a social media website and disable all domains for that website.
  8. Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

ITS 350-1 Portfolio project

 

Option #1: XYZ Corporation

XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).

In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.

You have been hired to secure XYZ Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:

  1. A plan to provide secure Access Control Methods for all user access
  2. A viable Password policy, which includes complexity, duration, and history requirements
  3. A cryptography method to ensure vital data is encrypted
  4. A remote access plan to ensure that users that access the network remotely do so in a secure and efficient manner
  5. A thorough plan to protect the network from Malware and other Malicious attacks

Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to the CSU Global Writing Center (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU Global Library is a good place to find these references.

Java Programming

Please read the instruction from these pictures.

You can use these codes below. 

game.java (The codes of the picture below) : 

https://drive.google.com/file/d/1vggE2dDlb9d7PdE1vB6_AIa2bxytc3Um/view?usp=sharing

Game.java : 

https://drive.google.com/file/d/1Ax_n-lW65wCPXgelFctKGnx93i1KNFdc/view?usp=sharing

GameObject.java : 

https://drive.google.com/file/d/1M3nbQUVt9FjY_aco5YtAN_g-moXgfYhk/view?usp=sharing

Enemy.java : 

https://drive.google.com/file/d/12ZmBwbsH5ltgSI18gWcZJX5DHwgEqYoi/view?usp=sharing

Player.java

https://drive.google.com/file/d/1Kn1PAXE3NONPyYPaeHBBH3gCdjcwaN6l/view?usp=sharing

Migration from local to Cloud Infrastructure

  

Deliverables

You company has been allocated an unlimited budget to move to a virtualization infrastructure. The current IT infrastructure exists on bare metal with no virtualization implemented at all. 

The current infrastructure contains the following components:

2 x Windows 2008 R2 Domain Controllers

2 x Exchange 2013 Servers

1 x SQL 2012 Server

1 x Red Hat 7.0 Apache Server

2 x Windows 2008 R2 Servers as File Servers

Your task is to do the following:

1) Provide a cost and description of the new hardware you will be implementing

2) Develop a migration plan to move all current infrastructure to virtualization (this also means 0 downtime)

3) Identify and Upgrade the old operating systems and software in the current infrastructure

4) Expand the current infrastructure to include new technologies (eg. An MDM solution)

Please create a detailed report on the tasks above.

social engineering

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.

Database management systems Or DBMS (Network Security- Cybersecurity)

 A database management system is an application that provides users with the means to manipulate, analyze, and query data. Almost all DBMSs in existence today are developed to be used with relational databases.  Describe in a minimum 2-page essay (about 1,000 words, double spaced, APA format) a DBMS that you have dealt with at a company, or as a customer.  How was it used to help you access the data? 

empowering leadership and effective collaboration in geographically dispersed teams

The attached journal article focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Format Requirements:

1. The paper must be minimum 3 pages excluding title and references pages. 

2. Include references of at least 5 peer reviewed papers supporting your case study. 

3. The paper must comply APA Format and include a cover page, an  introduction, a body with fully developed content, a conclusion and  references.

Write C program to encrypt and decrypt a file

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.