Module 5
Network Security
Unit 4
Breach Analysis and Mitigation
Learning Outcomes
- Describe a typical breach attack.
- Suggest suitable mitigations against typical attacks.
- Evaluate and select appropriate tools from the Kali Linux distribution.
e-Portfolio Component: Collaborative Discussion 2: The Pros and cons of logging – The impact of log4j
- A forum discussion post was published, presenting insights into the challenges of logging for security analysis versus the complexities of log-related exploits, specifically addressing the infamous Log4Shell vulnerability in Apache Log4j 2. Link to the discussion forum's post: here
e-Portfolio Activity: Scanning and Collaborative Wiki Activity
- Scans were performed against the website assigned in Unit 1 using Kali Linux tools, and the corresponding questions were answered. The results and responses were then posted on the wiki. Link to the wiki entry: here
Reflection
- The vulnerability scanning activities are proving quite engaging, enhancing my understanding of the website's architecture. The outcomes of these multi-tool scans will certainly be beneficial for the Unit 6 assessment.