Environment Analysis

 

 

 

 

Step 1: Setting Objective (1 Mark)
Choose anyone tool from https://cyberx.tech/free-cybersecurity-tools/
Choose minimum three objectives to perform through the tool selected to analyze/monitor a
system or a network. Submit the tool name and objectives through the form.
Deadline (22
nd November 2020)
Step 2: Setting up environment (1 Mark)
Installation of tool selected in step 2 to implement solutions/counter measures to monitor/analyze
the attack/threat or vulnerabilities to fulfill all the three objectives.
Step 3: Presentation (2 Marks) & Demo (3 Marks)
Prepare a Presentation with explanation about monitor/analyze the attack/threat or vulnerability and make
screenshots of tools and its implementation. And keep the demo ready to present it during your presentation.
Step 4: Report (3 Marks)
Prepare a report on the entire findings and suggested solution with the tool which you have installed to
mitigate the threat/attack or vulnerability.
All the steps need to be mentioned. Screen shots to be provided in a short report format with simple
explanation for each step. Please include step 1. Benefits, uses, environment, …etc of the tool to be
mentioned I short.
Step 3,4,5→ From 23
rd November-05
th
December 2020
Submission of Presentation & report in e-learning: 05th December 2020
Presentation will happen on 7th,9th & 13th December 2020 during the class hours.
Student name Tool
ABDUL-MALIK SALEH HAMED AL SAB’EI Burp Suite
AHLAM KHALFAN SULAIMAN AL RAHBI HPing
AISHA OMAR ABDULLAH ALQATABI AdBlocker
AL-Mundher Hamood Humaid AL-Ghafri NOSCRIPT
AL-ZAHRAA AHMED MOHAMMED AL AJMI TOTAL NETWORK MONITOR
FAISAL MOHAMED ISSA AL BALUSHI VPN
FATMA SALIM ABDULLAH AL BRAIKI HTTPS Everywhere
HALA NASSER KHAMIS AL-FORI BREACH ALARM(ONLINE)
HANAN SAID RASHID AL MAHRUQI Vulnerability Scanning Tools
IBTIHAL MOHAMED SAID AL-HARTHI Email security >>Mailwasher.
LAMEES FUAD RASHID AL HAJRI Ad Blocker
MARYAM RASHID KHALFAN AL BUSAIDI
password management, recovery and attack tools
(KeePass)
MOHAMMED KHAMIS SALIM AL-HAJRI SHRINK THE WEB
NADA IBRAHIM ABDUL RASOOL AL BALUSHI Mail washer
NOOR ABDULLAH MOHAMED AL-HAMDANI SafePad
Omran Abd Al Sattar Mohammed Al Hamdy Nessus
RAHAF ABDUL RAHMAN SAID AL ZADJALI CHECK SHORT URL
RAWAN ABDUL WAHAB ABBAS AL BALUSHI Dragon internet browser
RAYYAN SULAIMAN SALIM AL AMRI WIRELESSNET VIEW
RUQAIYA ISSA KHALFAN AL BADWAWI Ghostery
SAMAR YAHYA SULTAN AL-MADAHUSHIYA SafePad
SHUHD SAID KHALFAN AL-MASHRAFI KeePass
TASNIM MOHAMMED OBAID AL BALUSHI Messaging Tools – End to End Encryption/Signal
THAMRA ABDULLAH HAMOOD ABDULLAH ALHARTHY Zenmap
TURKIYA TALAL MANSOOR AL HINAI Internet Security
ARWA RASHID YAQOOB AL SHUAILI Email Security
ADNAN ALI JUMA AL-HASANI SCREEN SHOT MACHINE
AMNA MOHAMMED JABER AL-MAHROUQI Email Security/MailWasher
BADRIYA ALI SULTAN AL-HARTHI Wireshark
Ghadeer Harib Abdullah Al-Numani zenmap
ZAHRAN ABDULLAH SULAIMAN AL RAHBI WIRE SHARK

 

 

 

 

 

 

 

 

The post Environment Analysis first appeared on COMPLIANT PAPERS.

GET HELP WITH YOUR HOMEWORK PAPERS @ 25% OFF

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

Write My Paper Button

WeCreativez WhatsApp Support
We are here to answer your questions. Ask us anything!
👋 Hi, how can I help?
Scroll to Top