Module 5

Network Security

Unit 4

Breach Analysis and Mitigation

Learning Outcomes

  • Describe a typical breach attack.
  • Suggest suitable mitigations against typical attacks.
  • Evaluate and select appropriate tools from the Kali Linux distribution.

e-Portfolio Component: Collaborative Discussion 2: The Pros and cons of logging – The impact of log4j

  • A forum discussion post was published, presenting insights into the challenges of logging for security analysis versus the complexities of log-related exploits, specifically addressing the infamous Log4Shell vulnerability in Apache Log4j 2. Link to the discussion forum's post: here

e-Portfolio Activity: Scanning and Collaborative Wiki Activity

  • Scans were performed against the website assigned in Unit 1 using Kali Linux tools, and the corresponding questions were answered. The results and responses were then posted on the wiki. Link to the wiki entry: here

Reflection

  • The vulnerability scanning activities are proving quite engaging, enhancing my understanding of the website's architecture. The outcomes of these multi-tool scans will certainly be beneficial for the Unit 6 assessment.

Phone

-

Address

Mumbai, India