Hit The Order Button To Order A **Custom Paper**

>> CLICK HERE TO ORDER 100% ORIGINAL PAPERS FROM AustralianExpertWriters.com <<

4 Apr
2021

CSI2450 – IoT and OT Security

Category:ACADEMICIAN

SOLUTION AT Australian Expert Writers

CSI2450 Assessment 2 Case Study PAGE 1Edith Cowan UniversitySchool of ScienceCSI2450 – IoT and OT SecurityAssessment 2: Case Study RubricMarking Key/Rubrics:Please read, understand and do your best to apply each of the criterion and the requirements to score a good grade.
Criterion
Needs Improvement0% – 49%
Satisfactory50% – 69%
Good – Excellent70% – 100%
T1 – Introduction and Overview(4 marks)
Failed to provide an introduction and/oroverview.
An introduction is provided including some ofthe following:An introduction of the presenterAndDescribed the logical/conceptual setup diagramAndDescribed the attacks and defensive measuresusing the diagram.
An introduction is provided including all thefollowing:An introduction of the presenterAndDescribed the logical/conceptual setupdiagramAndDescribed the attacks and defensive measuresusing the diagram.
T2 – Server VM: Mosquitto Broker(4 marks)
Using the Server VM:The configuration of the Mosquitto BrokerAndEvidence that the broker is running were notshown.
Using the Server VM:The configuration of the Mosquitto BrokerAnd/orEvidence that the broker is running wereshown partially.
Using the Server VM:The configuration of the Mosquitto BrokerAndEvidence that the broker is running wereshown.
T3 – Client VM: Publisher and Subscriber(4 marks)
Using the Client VM:A Terminal window running the PublisherAnd/orA separate Terminal window running theSubscriber were not shown.
Using the Client VM:A Terminal window running the PublisherAnd/orA separate Terminal window running theSubscriber were shown partially.
Using the Client VM:A Terminal window running the PublisherAndA separate Terminal window running theSubscriber were shown.
T5 – Publisher and Subscriber communicatingwith the Mosquitto Broker(4 marks)
On the Server VM:Evidence of Publisher-Broker communicationwas not shownAnd/orEvidence of Subscriber-Broker communicationwas not shownAnd/orDid not describe the evidence.
On the Server VM:Evidence of Publisher-Broker communicationwas shown partiallyAnd/orEvidence of Subscriber-Broker communicationwas shown partiallyAnd/orDescribed the evidence to some extent.
On the Server VM:Evidence of Publisher-Broker communicationwas shownAndEvidence of Subscriber-Broker communicationwas shownAndDescribed the evidence.
CSI2450 Assessment 2 Case Study PAGE 2Edith Cowan UniversitySchool of Science
Criterion
Needs Improvement0% – 49%
Satisfactory50% – 69%
Good – Excellent70% – 100%
T6 – Port Scan(4 marks)
A Port Scan of the Server (Mosquitto Broker)was not shownAnd/orThe output of the Port Scan was not explained.
A Port Scan of the Server (Mosquitto Broker)was shown partiallyAnd/orThe output of the Port Scan was explained tosome extent.
A Port Scan of the Server (Mosquitto Broker)was shownAndThe output of the Port Scan was explained.
T7 – DoS attack(8 marks)
A DoS attack against the Server (MosquittoBroker) was not shownAnd/orThe consequence of the attack was not shownAnd/orThe consequence of the attack was notexplained.
A DoS attack against the Server (MosquittoBroker) was shown partiallyAnd/orThe consequence of the attack was shownpartiallyAnd/orThe consequence of the attack was explainedto some extent.
A DoS attack against the Server (MosquittoBroker) was shownAndThe consequence of the attack was shownAndThe consequence of the attack was explained.
T8 – Firewall(6 marks)
Firewall configuration/rules was not shownAnd/orThe effect of enabling the firewall was notshownAnd/orThe firewall did mitigate/block the attack.
Firewall configuration/rules was shownAnd/orThe effect of enabling the firewall was shownpartiallyAnd/orThe firewall mitigated/blocked the attack tosome extent.
Firewall configuration/rules was shownAndThe effect of enabling the firewall was shownAndThe firewall mitigated/blocked the attack.
T9 – IDS(6 marks)
The configuration/rules of the IDS was notshownAnd/orThe IDS did not detect the Port ScanAnd/orThe IDS did not detect the DoS attack
The configuration/rules of the IDS was shownAnd/orThe IDS detected the Port ScanAnd/orThe IDS detected the DoS attack
The configuration/rules of the IDS was shownAndThe IDS detected the Port ScanAndThe IDS detected the DoS attack.
Note: During marking, you may be given some general comments not related to the marking for improvement in future assignments/studies.

Order from Australian Expert Writers
Best Australian Academic Writers

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER

READ ALSO  Depression and yoga