cybersecurity / analysis of cyber security tools

Word length – body : 3000

Assignment : Apply analytical framework to cybersecurity capabilities, in order to bridge the gap between available technologies and desirable security properties. In doing so, understand and grasp the concepts and terminologies in this field, and gain experience in exploiting existing knowledge bases toward specific control objectives.


1. Understand technical characteristics. Pick two open-source tools for security assessment and control from different categories, e.g.:

a. Network Intrusion Detection System (Snort, Bro, etc.)

b. Host Intrusion Detection System (OSSEC, etc.)

c. Web Application Firewall (mod_security, etc.)

d. Honeypot (Kippo, etc.)

e. Security Information and Event Management (Cyberoam iView, etc.)

f. Network Vulnerability Scanner (nessus, etc.)

and understand their technical characteristics – i.e., what is the input and output, how they interact with, analyze, or aggregate input, and how they interact with operators. Use publicly available resources to help your understanding, e.g., manuals, white papers, slides, source code, and configuration examples.

Install and use these tools in your environment if possible. Confine the use of vulnerability scanner or other potentially offensive software within your own environment, e.g., by using virtual machines or physical separation.

2. Analyze cybersecurity capabilities. Based on the understanding of technical characteristics, discuss and analyze where they are effective (vulnerabilities, threats, risks), their limits, and identify residual risks (Note that we will introduce these concepts and terminologies in the class). You may combine or contrast the two tools that you have chosen, in order to develop unique views. In order to elaborate the discussion and analysis, use existing threat models (e.g., STRIDE) and existing risk management standard (ISO/IEC 27001). You may also use CVE, CWE and CAPEC to derive examples in your discussion. In your analysis, identify requirements to people (administrators, operators) and process (e.g., reporting duties, periodicity) in order to develop cybersecurity capabilities at organization level.

3. Report Writing. Prepare a comprehensive report which incorporates results of investigation, discussion and analysis from previous steps. Your ability to correctly use terminologies, existing models, knowledge base standards and risk management standards will be evaluated during our review. Organize your report for readability and integrity, and create Appendices wherever appropriate.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!