Category | Assignment | Subject | Computer Science |
---|---|---|---|
University | Singapore University of Social Science | Module Title | ICT338e Information Security Challenges in Smart Computing |
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.
You will use Wireshark to analyse network traffic for attacks. Depending on the OS of your machine, download and install Wireshark from this link.
Cheryl the system administrator has discovered malicious reverse shell connection activities while performing a routine check on her company web server’s log. She has managed to retrieve a Wireshark capture of the malicious network activities for further investigation. Apply the use of Wireshark and analyze the given network traffic ICT338 2020 ECA Q1a.pcap and answer all the questions below.
Salah the network administrator has discovered suspicious activities while performing a check on his company router’s network log. He has managed to retrieve a Wireshark capture of the suspicious network activities for further investigation. Apply the use of Wireshark and analyze the given captured network traffic ICT338 2020 ECA Q1b.pcap and answer all the questions below.
Malware has threatened computers, networks, and infrastructures since the 1980s. There are two major technologies to defend against this, but most organizations rely almost exclusively on just one approach, the decade’s old signature-based methodology. The more advanced method of detecting malware via behaviour analysis is gaining rapid attraction but is still largely unfamiliar.
Signature-based malware detection is used to identify “known” malware. In computing, all objects have attributes that can be used to create a unique signature. Algorithms can quickly and efficiently scan an object to determine its digital signature.
When an anti-malware solution provider identifies an object as malicious, its signature is added to a database of known malware. These repositories may contain hundreds of millions of signatures that identify malicious objects. This method of identifying malicious objects has been the primary technique used by malware products and remains the base approach used by the latest firewalls, email and network gateways.
Signature-based malware detection technology has several strengths, the main being simply that it is well known and understood – the very first anti-virus programs used this approach. It is also speedy, simple to run, and widely available. Above all else, it provides good protection from the many millions of older, but still active threats.
You will use PCRE (Perl Compatible Regular Expressions) to write simple programs to detect malware based on given signature patterns. Refer to the document below for a summary of the PCRE syntax.
Do You Need ICT338e Assignment of This Question
Order Non-Plagiarized AssignmentTWO (2) different malware has been released recently by hackers. For each of the malware, apply a regular expression to detect the signature of the malware among the FIVE (5) given malware signatures. Provide the regular expression used for each of the malware and screenshot of the detection process. Screenshots must be provided from the command prompt of your computer.
Due to the COVID-19 situation, the city of Corona is calling for a proposal for a Quarantine Monitoring System (QMS) in everyone’s home to keep track of those who are under home quarantine. QMS needs to keep track of the person’s health parameters such as temperature, heart rate, and whether the person has left the house without authorization. Once an abnormal situation occurs, QMS will send an alert to the police which is nearest to the location for investigation. QMS must be accessible by authorised users anytime and anywhere.
Using concepts of smart computing which you have learned in this module, propose a design which will satisfy all the given requirement. Assess the merits of your design, as well as critique any other potential issues such as security and privacy of data.
Hire Experts to solve this assignment Before your Deadline
Buy Today, Contact UsGet expert assignment help in Singapore for ICT338e Information Security Challenges in Smart Computing! We specialise in offering high-quality computer science assignment help, with an option for students to pay our experts to take on their assignment challenges. Need a reference? We also provide a free list of assignment examples to help you get started. With years of experience, our writers deliver 100% plagiarism-free content and offer unlimited revisions to meet your needs. Trust us to help you excel in your studies!
Let's Book Your Work with Our Expert and Get High-Quality Content