Environment Analysis

        Step 1: Setting Objective (1 Mark) Choose anyone tool from https://cyberx.tech/free-cybersecurity-tools/ Choose minimum three objectives to perform through the tool selected to analyze/monitor a system or a network. Submit the tool name and objectives through the form. Deadline (22 nd November 2020) Step 2: Setting up environment (1 Mark) Installation of tool selected in step 2 to implement solutions/counter measures to monitor/analyze the attack/threat or vulnerabilities to fulfill all the three objectives. Step 3: Presentation (2 Marks) & Demo (3 Marks) Prepare a Presentation with explanation about monitor/analyze the attack/threat or vulnerability and make screenshots of tools and its implementation. And keep the demo ready to present it during your presentation. Step 4: Report (3 Marks) Prepare a report on the entire findings and suggested solution with the tool which you have installed to mitigate the threat/attack or vulnerability. All the steps need to be mentioned. Screen shots to be provided in a short report format with simple explanation for each step. Please include step 1. Benefits, uses, environment, …etc of the tool to be mentioned I short. Step 3,4,5→ From 23 rd November-05 th December 2020 Submission of Presentation & report in e-learning: 05th December 2020 Presentation will happen on 7th,9th & 13th December 2020 during the class hours. Student name Tool ABDUL-MALIK SALEH HAMED AL SAB'EI Burp Suite AHLAM KHALFAN SULAIMAN AL RAHBI HPing AISHA OMAR ABDULLAH ALQATABI AdBlocker AL-Mundher Hamood Humaid AL-Ghafri NOSCRIPT AL-ZAHRAA AHMED MOHAMMED AL AJMI TOTAL NETWORK MONITOR FAISAL MOHAMED ISSA AL BALUSHI VPN FATMA SALIM ABDULLAH AL BRAIKI HTTPS Everywhere HALA NASSER KHAMIS AL-FORI BREACH ALARM(ONLINE) HANAN SAID RASHID AL MAHRUQI Vulnerability Scanning Tools IBTIHAL MOHAMED SAID AL-HARTHI Email security >>Mailwasher. LAMEES FUAD RASHID AL HAJRI Ad Blocker MARYAM RASHID KHALFAN AL BUSAIDI password management, recovery and attack tools (KeePass) MOHAMMED KHAMIS SALIM AL-HAJRI SHRINK THE WEB NADA IBRAHIM ABDUL RASOOL AL BALUSHI Mail washer NOOR ABDULLAH MOHAMED AL-HAMDANI SafePad Omran Abd Al Sattar Mohammed Al Hamdy Nessus RAHAF ABDUL RAHMAN SAID AL ZADJALI CHECK SHORT URL RAWAN ABDUL WAHAB ABBAS AL BALUSHI Dragon internet browser RAYYAN SULAIMAN SALIM AL AMRI WIRELESSNET VIEW RUQAIYA ISSA KHALFAN AL BADWAWI Ghostery SAMAR YAHYA SULTAN AL-MADAHUSHIYA SafePad SHUHD SAID KHALFAN AL-MASHRAFI KeePass TASNIM MOHAMMED OBAID AL BALUSHI Messaging Tools – End to End Encryption/Signal THAMRA ABDULLAH HAMOOD ABDULLAH ALHARTHY Zenmap TURKIYA TALAL MANSOOR AL HINAI Internet Security ARWA RASHID YAQOOB AL SHUAILI Email Security ADNAN ALI JUMA AL-HASANI SCREEN SHOT MACHINE AMNA MOHAMMED JABER AL-MAHROUQI Email Security/MailWasher BADRIYA ALI SULTAN AL-HARTHI Wireshark Ghadeer Harib Abdullah Al-Numani zenmap ZAHRAN ABDULLAH SULAIMAN AL RAHBI WIRE SHARK                

Sample Solution

Environment Analysis Cyber security is the method that is used to protect the network, system, or applications from the cyber-attacks. ModSecurity, sometimes called Modsec, is the “Swiss Army Knife” of web application firewalls. Its capabilities are almost astounding. They include: real time monitoring and access control, HTTP traffic logging, continuous passive security, and web application hardening. It protects sites and applications against many common attacks, including cross-site scripting and code injection attacks. ModSecurity is a handy tool to have in your arsenal if you server runs dynamic content management systems like Wordpress or eCommerce applications like Magento. ModSecurity uses a set of rules to determine which requests to accept and which to drop. The rules have to be provided by the server administrator. The most popular free ruleset is curated by OWASP. The OWASP ModSecurity Core Rule Set (CRS) is regularly updated and is capable of blocking a wide range of generic attacks.
introduce by America Southwest Airlines in 1973, Low Cost Carrier (LCC) have gain popularity and proven to be profitable [Uherek, 2006]. Many new companies had been form to provide this service around the Asian region around 1990s, currently Asia region have over 60 of such LCC mainly offering short distance flight within same country. Some of these airlines have started to offer long haul budget airline, for example Air Asia had introduce Air Asia X in 2007 that offer flight from Malaysia to London, Australia and India [Kent, 5th Jan 2007]. Although these Low Cost Carrier (LCC) were not yet considered as a direct competition to SIA as the target market for these airlines is more for cost conscious traveller, it is possible that in not so distance future, these LLC will venture into the premium market sector when the company reach certain level of business expertise. This trend is highly possible and should not be overlooked by SIA in the long run. It would be safe to assume that the treat of new entrants are remains low at the moment. 4.2 Rivalry among existing firms The goods in the airline industry have fairly short shelf live, the service is consider a loss once the airplane take off, and all cost incur are not recoverable. The seats are usually around 75% full in capacity. Airlines that are dominant in Singapore region and consider in direct competition with SIA are very few, they are Malaysian Airlines System, Japan Airlines, Cathay Pacific and British Airway. Even though there are few airline able to compete against SIA, these entire airlines are very similar in size and market shares, 2008 study on international passanger-kilometer flown for these airline range from 113,000million to 83,000million [IATA, 2008].

Comply today with Compliantpapers.com, at affordable rates

Order Now