联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp

您当前位置:首页 >> Python编程Python编程

日期:2020-03-20 10:31

END OF MODULE ASSESSMENT: In-Class Test

COLLEGE: Science

SCHOOL:School of Computer Science

MODULE: Cyber Security

MODULE CODE:CMP3750M

LEVEL: 3

DATE: May 2020

TIME ALLOWED: 2 Hours

INSTRUCTIONS TO STUDENTS:

QUESTIONS TO ANSWER: Answer ALL questions

MARKING SCHEME: Questions are individually weighted

MATERIALS PROVIDED: None

MATERIALS ALLOWED: Pen and Paper, PC

NOTES TO STUDENTS: Attempt all questions. Please write your answers on this answer file and submit the Supporting Documents on Blackboard. Once submitted you cannot change the file. This is a single submission only.

Do not use the Internet.

Once completed upload this document to Blackboard.


Part 1: Locating and interpreting log files

Log files are files used by computers to log events. Software programs, background processes, services, or transactions between services, including the operating system, generate these events. Log files are dependent on the application that generates them and is implemented by the software developer.

1.Identify the log files used for authentication.

What is the log file used for authentication?

______________________________________________   [2 Marks]


4.The output below is from a log file generated by an Apache web server.

[Wed Mar 22 11:23:12.207022 2017] [core:error] [pid 3548:tid 4682351596] [client 209.165.200.230] File does not exist: /var/www/apache/htdocs/favicon.ico


What information do the following identifiers provide?

IdentifierInformation provided

Timestamp

PID

Type

Client

Description[5 Marks]

Examine the output and describe what happened.[6 Marks]

Part 2: Setting file permissions

Permissions are the best internal method to prevent unauthorised access to end users. For example end users in marketing do not need access to finance. To facilitate this we can use permissions based on User, Group and Other. We can also set read, write and execute permissions for individual files.

1.Load the cybercops VM.

2.Load a terminal window.

3.Create a folder called inclass


What command can you use to create this folder? _________________________________________________   [2 Marks]


4.There are three files in the inclass folder called test1, test2, test3


5.Change the permissions for Test1 for the user and group to read, write and execute.

a. Explain how this was done and detail the command.[6 Marks]

b. What is the effect of these changes on the user and group?[4 Marks]

6.Change the permissions for Test2 for the group to read and write.

a. Explain how this was done and detail the command.[6 Marks]


b. What is the effect of these changes on the user? [4 Marks]


7.Take away all permissions for Test3 for Other.

Explain how this was done.[3 Marks]

8.Convert the following file permissions into letter representation.


NumericPermissions

Part 3: Construct ACL’s to meet a given scenario

Access Control Lists are key security elements designed to prevent inappropriate use of networks. Given the topology below you are required to create access control lists to control the flow of data.


1.Write an ACL to block all web requests from 192.168.10.27

[6 Marks]


2.Write an ACL to block all FTP traffic from 192.160.11.65

[6 Marks]


3.Write an ACL to block all ICMP requests from entering the network.

[6 Marks]


Part 4: Substitution Cipher

Substitution ciphers are based on letter frequencies, length of words and frequency of occurrence. The graph below represents the occurrence in order of letters in the English language.

Consider the following quote from Frank Abagnale of Catch Me If You Can fame.

FC VLR EXMMBK QL QBII JB TEBOB VLSO TBOB YLOK VLRO AXQB LC YFOQE XKA QEXQ HFKA LC FKCLOJXQFLK QEBK FJ 98 MBOZBKQ LC QEB TXV QL PQBXIKD VLRO FABKQFQV


1.Complete the table below with the number of letter frequencies

2.Identify the most commonly occurring words. These will be two, three four letters long. [6 Marks]


3.De-crypt the message.[10 Marks]


版权所有:编程辅导网 2021 All Rights Reserved 联系方式:QQ:99515681 微信:codinghelp 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。 站长地图

python代写
微信客服:codinghelp