Você está na página 1de 1

Security and Cryptography DT249-4

Over the last two decades security has become one of the most important issues in the
Information Communication Technology landscape of most organisations. Organisations
need security in order to ensure that their information processing systems are reliable.
While Operating Systems provide some primitive security services, these are not enough
to organisations expected to maintain a higher standard of data confidentiality, integrity
and availability. Therefore, we have been witnessing a proliferation of security tools
which provide additional security services to the information processing systems. Most of
these security tools are used for checking and reporting the state of the systems and in
some cases solving identified problems. Some security tools go a step further in the sense
that they have sinister motives of deceiving users. We have reached a stage where it is
extremely difficult to determine if the use of a particular security tool is legal or not. To
make matters interesting legislators are busy making laws that react to public opinion and
in some cases without a lot of thought on their implications to end users and developers.
Therefore, even using some of the security tools for research is as uncertain as hackers
seem to be with the law.
In this assignment you will be required to research the following: (and write a report
about your research result)
1. Identify one security tool which is used in order to detect operating systems,
sessions, hostnames, open ports etc for footprinting . 20%
2. The Kali https://www.kali.org/ (or similar software package) and investigate
the use security tools it provides. You will be required to demonstrate the
work of two security tools of your choose in your report. 40%
3. Identify one security tool which are used to capture wireless network
traffic 15%
4. Discuss programs are current exsiting in the market which are used to enforce
password. 15%
5. Discussing issues in your report, such as the impact of laws in the use of
security tools in this assignment. 10%
Each team will be required to submit the research report before 18:00 of the 18th
December 2015.
The report should not be more then 5000 words, screen shot must be included.
References
1. http://www.defeatingthehacker.com/chapter.htm, (last accessed 9th October 2014)
2. http://www.securityfocus.com/, (last accessed 9th October 2014)
3. http://sectools.org/, (last accessed 9th October 2014).
4. http://www.security-database.com/toolswatch/, (last accessed 9th October 2014).
5. http://exploitsearch.com/, (last accessed 9th October 2014).
6. http://securitytube.net/Default.aspx, (last accessed 9th December 2012).
7. Peter Sommer, Criminalising hacking tools, Digital Investigation 3(2): 68-72 (2006)

Você também pode gostar