A Not-for-Profit Organisation Working in the Area of Protection of Human Rights: Ethical Hacking Assignment, TU, Singapore

University Teesside University (TU)
Subject Ethical Hacking

Scenario

A not-for-profit organisation working in the area of protection of human rights asks you to plan, execute, and document an ethical hack against their systems in order to assess their security. Moreover, based on your findings, you are required to provide advice on how to improve the security of the system.

The organization periodically receives confidential reports from correspondents and advisors regarding the alleged violation of human rights. These reports can be the bases for actions taken by the organisation such as providing legal support, launch urgent actions, sending information to supranational institutions like for example the “United Nations Human Rights Office for the High Commissioner”. An example of the nature of such communications can be found here: https://www.ohchr.org/EN/Issues/Housing/Pages/IndividualComplaints.aspx

The organisation is concerned that a possible data breaches that may compromise the confidentiality of the information and the identity of correspondents and advisors.

For the purpose of your security analysis, they provide you the following scheme and details:

A not-for-profit organisation working in the area of protection of human rights ask you to plan

IPCop is a Linux based firewall/router that controls the access to different zones of the system (zones can be seen as separate network entities, with no traffic across zones allowed without special permission):

Red — the Internet

Green — the safe zone for maximum protection

Orange — a DMZ designed for Web, mail, or other Internet servers

Blue — for wireless networks

Hire a Professional Essay & Assignment Writer for completing your Academic Assessments

Native Singapore Writers Team

  • 100% Plagiarism-Free Essay
  • Highest Satisfaction Rate
  • Free Revision
  • On-Time Delivery

Orange Zone:

The webserver is an Ubuntu 16.04 LTS machine running Apache 2.4.x

The email server is an MS Windows Server 2012R2, running MailEnable Standard Edition 10.26

Green Zone:

The Server: Windows 2012R2, with Active Directory, DHCP, DNS, IIS. The server also runs a MySQL Server 5.5, the back-end for a custom web application that is used by the financial office. The server contains also shared folders, which are used for different purposes: projects, advisors reports, and other classified and non-classified documents. The workstations are Windows 10.

Blue Zone:

Employees and volunteers are allowed to bring their own devices and connect to the internet.

No further information and no credentials are given except the public IP address and the domain name of the webserver (since this information is purely hypothetical we simply use these placeholders <PUBLIC_IP_ADDRESS> and <DOMAIN_NAME> to indicate them in your report).

The client specifically requests that:

  • No data should be lost from any system during the pen-testing. If any change is done, for a proof-of-concept, you should also identify a procedure to restore the system to the previous state;
  • The risk of disrupting the services should be minimised, in particular during office hours;
  • You have a limited number of hours for this task, so your planning should prioritise the key services and components;
  • The pen testing activities should be carried out with FOSS or free software unless such an option does not exist for a specific task. In this case, you should make clear the license terms and costs.

Task

You should write a report (approximately 4500 words, submitted in PDF format) detailing your plan, with a justification for tools and techniques used, the results, and a complete chronological audit trail of hacking actions taken in line with expected professional and ethical standards.

In particular, for the practical part, you have to carry out a pen testing limited to a given component. For the rest of the work, use the information provided in the scenario, and make the appropriate reasonable assumptions if necessary (provide a rationale for it).

The report will have cover all the stages of the ethical hacking methodology. The report should include at least the following elements (xx% indicates the weight in the mark allocation):

  1. Demonstration of understanding of the scenario and discussion of the pre-engagement interactions.
  2. Identification of relevant tools for each stage of ethical hacking.
  3. Appropriate information gathering and threat modeling
  4. Identification of security vulnerabilities
  5. The exploitation of the vulnerabilities
  6. Post exploitation activities
  7. Reporting of the findings and potential suggestions for countermeasures
  8. Critical reflection of self-performance and the development of skills for employment as a computer security professional.
Get Help By Expert

We at SingaporeAssignmentHelp.com offer ethical hacking assignment help services to Teesside University scholars by our online assignment experts. Our experts help the students in making a high-quality information technology assignment document and help them to grab high grades in their academics.

Answer

Looking for Plagiarism free Answers for your college/ university Assignments.

Ask Your Homework Today!

We have over 1000 academic writers ready and waiting to help you achieve academic success