Environment Analysis

 

 

 

 

Step 1: Setting Objective (1 Mark)
Choose anyone tool from https://cyberx.tech/free-cybersecurity-tools/
Choose minimum three objectives to perform through the tool selected to analyze/monitor a
system or a network. Submit the tool name and objectives through the form.
Deadline (22
nd November 2020)
Step 2: Setting up environment (1 Mark)
Installation of tool selected in step 2 to implement solutions/counter measures to monitor/analyze
the attack/threat or vulnerabilities to fulfill all the three objectives.
Step 3: Presentation (2 Marks) & Demo (3 Marks)
Prepare a Presentation with explanation about monitor/analyze the attack/threat or vulnerability and make
screenshots of tools and its implementation. And keep the demo ready to present it during your presentation.
Step 4: Report (3 Marks)
Prepare a report on the entire findings and suggested solution with the tool which you have installed to
mitigate the threat/attack or vulnerability.
All the steps need to be mentioned. Screen shots to be provided in a short report format with simple
explanation for each step. Please include step 1. Benefits, uses, environment, …etc of the tool to be
mentioned I short.
Step 3,4,5→ From 23
rd November-05
th
December 2020
Submission of Presentation & report in e-learning: 05th December 2020
Presentation will happen on 7th,9th & 13th December 2020 during the class hours.
Student name Tool
ABDUL-MALIK SALEH HAMED AL SAB’EI Burp Suite
AHLAM KHALFAN SULAIMAN AL RAHBI HPing
AISHA OMAR ABDULLAH ALQATABI AdBlocker
AL-Mundher Hamood Humaid AL-Ghafri NOSCRIPT
AL-ZAHRAA AHMED MOHAMMED AL AJMI TOTAL NETWORK MONITOR
FAISAL MOHAMED ISSA AL BALUSHI VPN
FATMA SALIM ABDULLAH AL BRAIKI HTTPS Everywhere
HALA NASSER KHAMIS AL-FORI BREACH ALARM(ONLINE)
HANAN SAID RASHID AL MAHRUQI Vulnerability Scanning Tools
IBTIHAL MOHAMED SAID AL-HARTHI Email security >>Mailwasher.
LAMEES FUAD RASHID AL HAJRI Ad Blocker
MARYAM RASHID KHALFAN AL BUSAIDI
password management, recovery and attack tools
(KeePass)
MOHAMMED KHAMIS SALIM AL-HAJRI SHRINK THE WEB
NADA IBRAHIM ABDUL RASOOL AL BALUSHI Mail washer
NOOR ABDULLAH MOHAMED AL-HAMDANI SafePad
Omran Abd Al Sattar Mohammed Al Hamdy Nessus
RAHAF ABDUL RAHMAN SAID AL ZADJALI CHECK SHORT URL
RAWAN ABDUL WAHAB ABBAS AL BALUSHI Dragon internet browser
RAYYAN SULAIMAN SALIM AL AMRI WIRELESSNET VIEW
RUQAIYA ISSA KHALFAN AL BADWAWI Ghostery
SAMAR YAHYA SULTAN AL-MADAHUSHIYA SafePad
SHUHD SAID KHALFAN AL-MASHRAFI KeePass
TASNIM MOHAMMED OBAID AL BALUSHI Messaging Tools – End to End Encryption/Signal
THAMRA ABDULLAH HAMOOD ABDULLAH ALHARTHY Zenmap
TURKIYA TALAL MANSOOR AL HINAI Internet Security
ARWA RASHID YAQOOB AL SHUAILI Email Security
ADNAN ALI JUMA AL-HASANI SCREEN SHOT MACHINE
AMNA MOHAMMED JABER AL-MAHROUQI Email Security/MailWasher
BADRIYA ALI SULTAN AL-HARTHI Wireshark
Ghadeer Harib Abdullah Al-Numani zenmap
ZAHRAN ABDULLAH SULAIMAN AL RAHBI WIRE SHARK

 

 

 

 

 

 

 

 

Sample Solution

Environment Analysis

Cyber security is the method that is used to protect the network, system, or applications from the cyber-attacks. ModSecurity, sometimes called Modsec, is the “Swiss Army Knife” of web application firewalls. Its capabilities are almost astounding. They include: real time monitoring and access control, HTTP traffic logging, continuous passive security, and web application hardening. It protects sites and applications against many common attacks, including cross-site scripting and code injection attacks. ModSecurity is a handy tool to have in your arsenal if you server runs dynamic content management systems like WordPress or eCommerce applications like Magento. ModSecurity uses a set of rules to determine which requests to accept and which to drop. The rules have to be provided by the server administrator. The most popular free ruleset is curated by OWASP. The OWASP ModSecurity Core Rule Set (CRS) is regularly updated and is capable of blocking a wide range of generic attacks.

introduce by America Southwest Airlines in 1973, Low Cost Carrier (LCC) have gain popularity and proven to be profitable [Uherek, 2006]. Many new companies had been form to provide this service around the Asian region around 1990s, currently Asia region have over 60 of such LCC mainly offering short distance flight within same country. Some of these airlines have started to offer long haul budget airline, for example Air Asia had introduce Air Asia X in 2007 that offer flight from Malaysia to London, Australia and India [Kent, 5th Jan 2007]. Although these Low Cost Carrier (LCC) were not yet considered as a direct competition to SIA as the target market for these airlines is more for cost conscious traveller, it is possible that in not so distance future, these LLC will venture into the premium market sector when the company reach certain level of business expertise. This trend is highly possible and should not be overlooked by SIA in the long run. It would be safe to assume that the treat of new entrants are remains low at the moment. 4.2 Rivalry among existing firms The goods in the airline industry have fairly short shelf live, the service is consider a loss once the airplane take off, and all cost incur are not recoverable. The seats are usually around 75% full in capacity. Airlines that are dominant in Singapore region and consider in direct competition with SIA are very few, they are Malaysian Airlines System, Japan Airlines, Cathay Pacific and British Airway. Even though there are few airline able to compete against SIA, these entire airlines are very similar in size and market shares, 2008 study on international passanger-kilometer flown for these airline range from 113,000million to 83,000million [IATA, 2008].

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.