Assessment item 3 – Analytical Questions
Value: 15%
Due Date: 12-Sep-2021 Return Date: 06-Oct-2021 Group Assessment: No
Submission method options: EASTS (online) TASK
Investigate attacks on anonymising networks
This assessment aims to assess the understanding of anonymising network inside the Dark Web using The Onion Router (TOR) and analysing the network traffic. This assessment task will also assess the following learning outcome of this subject as well as measuring progress towards all the learning outcomes:
be able to investigate the usage of anonymising networks in the dark web using publically available tools
Description:
In preparation for this assessment, you will be given a tour of the dark web and walked through the technical details of how it works. Using this knowledge and skill, you will explore how organisations can use the Darknet as a threat intelligence resource to proactively secure your organisation’s information in this assessment. You are required to prepare an anonymising network analysis report using the Tor browser based on the following scenario:
As a security specialist for an organisation, you are tasked with the early detection of potential threats and vulnerabilities such as data leaks and other cyber incidents that may damage your organisation’s reputation. The organisation’s web server has alerted you to suspicious activity. Initially, you investigated the security logs and completed all other security compliance procedures that could be the source of an entry that appeared suspicious but no malicious activity was detected. As part of your organisation’s security precautions and policies, you proceed to investigate the source of the suspicious activity by going to the hidden/secret site of the web by using available anonymising network tools.
Exploration of the dark web conditions: you may stumble upon the content you do not want to see, as part of the safety practices when exploring the Dark Web, it is expected that you stick to the purpose of this assessment task and look solely for sites relevant to the threat intelligence. In line with CSU’s duty of care, you will be required to capture how you used the safety protocols in your final report.
Your task:
You will access your network security logs (please make sure that you are not breaching the privacy if it is your workplace logs)
Your task is to access the Dark Web safely and anonymously using the Tor network through the Tor browser. The best way to keep yourself private you may combine Tor with a VPN. You will be required to describe how you have kept safe while exploring the Dark Web.
Navigate the Dark Web to discover suspicious activity by digging through search engines. You need to start with Tor browser to conduct the dark web investigations
Evaluate its routing protocols and security features. You should be able to describe the navigated hidden web traffic logs for your traffic analysis
In your report, you must include a description of the potential challenges of the Tor network concerning traffic analysis.
This assessment also provides an opportunity for you to :
– demonstrate factual knowledge, understanding and application of state-of-art of the anonymizing network;
– demonstrate the ability to investigate the usage of anonymising networks in the dark web
– apply understanding and knowledge to a practical situation; MARKING CRITERIA AND STANDARDS
The following standards will be used to mark part B:
Assessable Components HD DI CR PS
Access and collection of dark web traffic, summarize the report with potential challenges of traffic analysis, including steps to safeguard yourself while exploring the Dark Web.
Maximum marks:15 Comprehensive summary of the report is provided which is consistent with the task.
Report provides logical statements that explicitly illustrates how access and collection of dark web traffic was achieved. The potential challenges to traffic analysis was explained in full. Safety protocols captured in report. Report language is appropriate to the assessment with accurate referencing using APA
6th edition. Detailed report summary that is consistent with the
task. Provides a accurate and detailed overview of the results, threats and vulnerabilities including a explicit reference to challenges faced in analysing network traffic. Safety protocols captured in report. Report language is appropriate to assessment with accurate referencing using APA
6th edition. Good summary of results reflecting the assessment purpose.
Provides a general overview of the results, threats and vulnerabilities, including an outline of challenges faced in analysing network traffic. Safety protocols captured in the report. Report language appropriate to assessment with proper referencing. Satisfies the minimum requirements. Provided basic description of access and collection of dark web traffic and summarised the challenges faced in analysing net work traffic. Safety protocols captured in the report. Summary report contains referencing.
PRESENTATION
Presentation
Your answers to the questions should be precise but complete and informative.
Your submission must be in a form readable by Microsoft Word or PDF/Acrobat format and submit it via EASTS.
The report should be precise but complete and informative and the number of words within 800-1000 words.
Your submission must be no more than 8 pages long (including diagrams), must have margins no less than 2cm, and a font size no less than 12 points.
Any text adapted from any source must be clearly labelled and referenced. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu.
REQUIREMENTS
For this assessment, you are required to use APA referencing to acknowledge the sources that you have used in preparing your assessment. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to use that
demonstrates how to correctly use in-text referencing and the correct way to cite the reference in your reference list can be found at https://apps.csu.edu.au/reftool/apa-6