Welcome






SAMPLE  ESSAYS

data analysiis and literature review

  Business Research Skills - Assignment 3: Individual Report This report consists of two parts: Part 1 requires you to ...
Read More

portfolio management

  Focus on those analyses for five companies (QIGD Qatari Investors Group (Al-Khalij Holding Previously), QEWS Electricity & Water, Aamal ...
Read More

Archetypal/Myth Literary Criticism.

  Feminist Literary Criticism Alcott, Louisa May (1863). ?The Death of John.? a/k/a ?Death of a Soldier.? From Hospital Sketches ...
Read More

Assessment Details

Createareportexploringthestagesinvolvedinaspecificattack(ofyourchoice)againsta computingsystem. Selectandresearchanattackofyourchoice.Theattackshouldbetechnicalinnatureand exploitavulnerabilitytocompromisethesecurityofaprocess,service,system,ornetwork. Youarerequiredtoshowevidencethatyouhavesuccessfullycarriedoutthisexploitwithin alabenvironment.Ifyouwish,youmaychoosetouseoneofthevulnerabilitiesthatyou exploitwithinthelabexercises:forexample,theRPCDCOMorWebDavexploit.However, selectinganattackthatisnotcoveredinthelabexercisescanresultinhighermarks,as describedinthemarkingcriteria. Youarerequiredtouseattacksoftwareofyourchoice(suchasMetasploit,Armitage, sqlmap,astand-alonecustomexploit,orothersoftwareofyourchoosing),andtake screenshotsdemonstratingeachofthestagesintheattack.Thesescreenshotsareusedto illustratethecontentofyourreport.Again,youmaychoosetouseattacksoftwarecovered in thelabs;however,usingsoftwarethatisnotcoveredinthelabexercisescanresultin highermarks. Allocationofmarksaredescribedbelow.Markingwillbeconductedusingaspreadsheetthatgeneratesmarksbasedonperformanceineachofthemarkingschemeareas.For example,eachrequirementwillhaveanumberofcommentsdescribingpossibleoutcomes (suchas“CorrectHarvardreferencingstyle”,or“Harvardreferencingstylecontainserrors”, or“Noreferencing”).Markingwillinvolveselectingorcreatingappropriatefeedback ...
Read More

WPMessenger