Skip to content

University coursework demonstrating information security principles, reconnaissance, network defence, and insider threat mitigation using VirtualBox, Nmap, and UFW.

Notifications You must be signed in to change notification settings

tommason05/security-fundamentals

Repository files navigation

Security Fundamentals Portfolio

This repository showcases my individual coursework for the CIS2710 – Security Fundamentals (2024) module, completed as part of my BSc (Hons) Computing (Networks, Cyber Security & Forensics) degree at Edge Hill University.
It demonstrates my understanding of ransomware threats, reconnaissance testing, and network defence techniques using tools like Kali Linux, Nmap, and UFW.


πŸ“˜ Coursework Overview

🧩 Task 1 – Ransomware Case Study

Focus: Analysed the 2024 Indonesia National Data Centre ransomware attack carried out by the Brain Cipher group (LockBit 3.0 variant).

Highlights:

  • Performed detailed threat and vulnerability analysis
  • Identified weak access control and lack of incident response
  • Proposed mitigation strategies: MFA, patch management, security awareness training
  • Evaluated the impact on data confidentiality, integrity, and availability

πŸ“Ž Download Task 1 Report (PDF)


🧠 Tasks 2 & 3 – Network Reconnaissance and Defence

Focus: Practical simulation of network reconnaissance and firewall defence in a VirtualBox lab environment.

Highlights:

  • Conducted footprinting and scanning using Nmap, Netcat, Masscan, and Metasploit
  • Identified open ports (FTP 21, SSH 22, HTTP 80) and associated vulnerabilities
  • Implemented UFW firewall rules to harden the system and mitigate risk
  • Analysed insider threats and proposed defences such as MFA, DLP, and security awareness training

πŸ“Ž Download Tasks 2 & 3 Report (PDF)


🧰 Tools & Concepts

  • VirtualBox (Ubuntu + Kali Linux)
  • Nmap, Masscan, Netcat, Metasploit
  • UFW (Uncomplicated Firewall)
  • Ransomware analysis (LockBit 3.0)
  • Risk management and threat mitigation
  • Insider threat prevention and DLP

πŸ“« Author: Thomas Mason
πŸŽ“ BSc (Hons) Computing – Networks, Cyber Security & Forensics
πŸ”— LinkedIn

About

University coursework demonstrating information security principles, reconnaissance, network defence, and insider threat mitigation using VirtualBox, Nmap, and UFW.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published