Part 1: Network Attacks Investigation
Investigate past network assaults, then choose one to present to the class.
Part 2: Network Security Audit and Attack Tool Research
Choose a tool and write a report for the class to see.
Over the years, hackers have created a variety of methods for attacking and compromising networks. These assaults can take a variety of forms, but the majority of them aim to steal sensitive information, destroy resources, or restrict authorized users’ access to resources. When network resources are unavailable, worker productivity suffers and revenue is lost. An administrator must first discover network vulnerabilities in order to understand how to defend against assaults. Security audit software created by equipment and software makers can assist
discover potential flaws. Network specialists can use the same tools that individuals use to attack networks to assess a network’s capacity to mitigate an assault.
Steps can be done to defend the network once the vulnerabilities have been detected. This laboratory offers a two-part organized research project: Network Attacks and Security Audit Tools are two topics that I’m researching. Inform your instructor about the network attack(s) and network security
audit tool(s) you want to investigate. As a result, members of the class will be able to report on a wide range of network attacks and vulnerability tools.
Part 1 investigates real-world network assaults. Choose one of these assaults and explain how it was carried out, as well as the scope of the network outage or damage. Next, look at how the attack was mitigated, and what mitigation techniques were used to prevent future assaults. Finally, using the form provided in this lab, write a report.
Part 2 will look into network security auditing and attack tools. Examine one that can be used to detect vulnerabilities in hosts or network devices. Using the form given in this lab, create a one-page summary of the tool.
Prepare a 5- to 10-minute presentation for the class to hear. Working in two-person teams is possible, with one person reporting on the network attack and the other on the tools. Each team member summarises their findings in a brief presentation. To summarise your findings, you can use live demonstrations or Powerpoint.
Computer with Internet access for research Presentation computer with PowerPoint or other presentation software installed Video projector and screen for demos and presentations