Chat with us, powered by LiveChat Cyber Security Department Graduation Project (407422) Project Title Here ?.? Submitted By: ??? Student Name Student ID ? Name 1 Id1 ? Term: ? ? Date:? ??? | WriteDen

Cyber Security Department Graduation Project (407422) Project Title Here ?.? Submitted By: ??? Student Name Student ID ? Name 1 Id1 ? Term: ? ? Date:? ???


Cyber Security Department

Graduation Project (407422)

Project Title Here …. 

Submitted By:


Student Name

Student ID


Name 1







Table of Contents

1. Introduction 5

2. Problem Statement 5

3. Background 5

4. Requirements and specification 5

4.1. User Groups 5

4.2. Functional Requirements 6

4.3. Non-Functional Requirements (NFRs) 7

5. System Design 10

5.1. Solution Concept 10

5.2. Proposed System Architecture. 11

5.2.1 Alternative 1. 11

5.2.2 Aternative 2. 11

5.2.3 etc 11

5.2.4 Production and Staging Environments 13

5.3. Component Design. 13

5.3.1 Hardware Components 13

5.3.2 Software Components 13 User Interface – Web client 13 Use Case Description. 13 Back-End Database. 14

4.4. Design Evaluation. 15

6. Implementation 16

6.1 System Implemented Architecture. 16

6.1.1. Tier Two – Application Server and Web-Server 16 The Web-Server 16

<<if needed>>. 16

6.2 Access Levels 16

6.3 System Services or Functionalities 16

7. Testing, Analysis and Evaluation 17

7.1 Testing Methodology. 17

7.2 System Analysis and Evaluation. 17

7.3 Test Execution and Test Results 17

7.3.1 Integration Testing. 17

7.3.2 Functional Testing. 17

7.4 Examples on testing. 18

7.4.1 Check password Strength. 18

<< this might be an example of testing password strength>>. 18

8. Issues, Engineering Tools and Standards 18

8.1. Issues 18

8.2. Engineering Tools and Standards 18

9. Teamwork 18

10. Conclusion 20

10.1. Conclusion. 20

10.2. Future Work. 20

Appendix A: Test Plan 21

Appendix B: Progress Report-Teamwork 22

Appendix C- Attachments and Source Code 24

References 25


List of Figures

Figure 5 Use-Case Diagram.. 12

Figure 7 High Level Implementation Architecture. 15

Figure 14 Security Domains Access Levels. 15

List of Tables

Table 1 User Groups. 5

Table 2 Non Functional Requirements. 7

Table 3 System Use Case Description. 12

Table 4 Comparing On-Cloud and On-Site Options. 14

Table 7 Team responsiblites, Contributions, and expertise. 18


1. Introduction

Systems and workstations that are running Microsoft Windows but have not been patched against the vulnerability that is known as "Eternal Blue" are susceptible to having their data stolen if the vulnerability has not been patched. A vulnerability is a fault in a computer system that, when exploited, could compromise the device's or system's level of security (Ding, et al., 2019). After the security flaw has been exploited, the hacker will be able to steal information, which will result in a data breach. The SMBv01 protocol that is utilized by Windows systems is the target of the vulnerability known as Eternal Blue. 

Techniques such as heap spraying and buffers overrun are utilized throughout the attack in order to gain access to systems and devices that are powered by Windows operating systems. Notably, this vulnerability was exploited in the WannaCry ransomware attack that occurred in 2017, which encrypted the files of victims and demanded a ransom in order to decrypt the information. After it was initially launched, the attack would quickly spread to other systems, delivering corrupted data that would be processed via the SMB protocol. It is inside this protocol that the vulnerability can be located. After a hack by a group of hackers known as the Shadow Brokers in 2017, who broke into a cache of cyber weapons kept by the National Security Agency (NSA), the origin of the eternalblue vulnerability was discovered to be the United States National Security Agency (NSA).

2. Problem Statement

Any company or organization worth its salt recognizes that data and information are among its most valuable assets. A hack of a successful corporation's data and information might easily bring the organization to its knees. A data breach occurs when an unauthorized entity is able to access information from an individual, an organization, or a system. A data breach can also refer to the act of stealing information. A data breach occurs whenever there is unauthorized access to data, regardless of whether or not the information is utilized inappropriately. Systems and workstations that are running Microsoft Windows but have not been patched against the vulnerability that is known as EternalBlue can have their data compromised if the vulnerability has not been addressed. They are able to insert a variety of code referred to as a "RAT," which gives the hacker complete control of the device that has been compromised. Even further, it is able to propagate and proliferate over all of the devices that are connected to the same network.

A vulnerability is a fault in a computer system that, when exploited, could compromise the device's or system's level of security (Ding, et al., 2019). After the security flaw has been exploited, the hacker will be able to steal information, which will result in a data breach. The goal of this project is to make users more aware of an exploit known as eternalblue and to identify steps that users may take to protect their data and information from being compromised by a data breach caused by eternalblue. A comprehensive explanation of how the vulnerability can be exploited will be provided, along with recommendations for mitigating its effects and safeguarding the affected devices and systems.

3. Background

Numerous researchers have conducted in-depth investigations into the roles that each player played in the development and propagation of the virus that was responsible for the deadly hack. It is possible to cast a wide net of blame on Microsoft's insecure protocol, Russia's use of the malware, and the business I.T. professionals within organizations that failed to apply the available patch to all of their compromised systems; however, when analyzing the role of the NSA, journalists primarily focus on what factors contributed to the data breach and what measures could be taken to prevent future leaks. Microsoft's unsecure protocol was one of the factors that contributed to the data breach. Russia's use of the malware was They come to the conclusion that the failure of the NSA to protect its secrets, which includes the hacking tools it uses, is the primary source of worry for which the institution must be held accountable. Greenberg exposes the absurdity of the United States' habit of shifting responsibility for its problems onto former administrations and other nation-states around the world, as he does in his discussion of the WannaCry attack. 

Ransomware attack directed on North Korea, without first looking inwards. He draws attention to the policies and procedures at the workplace that enabled two NSA employees to take substantial collections of highly sensitive hacking equipment home with them. One of the employees' personal PCs reportedly used antivirus software made by Kapersky, a Russian security business. This indicates that the malware crafted by the NSA was uploaded to the corporation's servers and remained there for an undetermined amount of time. The reporter also brings up the hazy language and the lack of transparency in the implementation of the White House's Vulnerabilities and Equities Process. This is a document that is intended to guide which vulnerabilities are reported to the associated vendors and which are kept secret to gather foreign intelligence. However, the reporter notes that the document's language is hazy and that there is a lack of transparency in its implementation (Greenberg, 2017).

The reporting done by Shane, Perlroth, and Sanger includes the National Security Agency (NSA) as a victim within this network,  completely deprived of any and all sense of morale, with the Shadow Brokers being the villains responsible for the crime. This framing is obvious when referring to the case as "one of the biggest security debacles ever to afflict American intelligence" and as exceeding by a significant margin the damage that was caused by Edward Snowden. They investigate how members of the NSA's internal hacking division, known as Tailored Access Operations (T.A.O), have been impacted by the revelations, with some individuals leaving the organization and others being forced to cancel visits abroad out of concern for their safety. The reporting then continues to describe a toxic environment that is now plagued with polygraphs and suspensions, and the company has difficulties maintaining personnel (Makrakis et al., 2021). The journalists also cover additional victims of the actions taken by the Shadow Broker that led to the disruption of business across the globe. These victims include the millions of computers that were locked by ransomware, businesses that experienced the loss of all of their data, and hospitals in Indonesia, Britain, and even Pennsylvania that were forced to reject patients (Shane et al., 2017).

4. Requirements and specification

4.1. User Groups

Table 1 lists the Users or groups of Users who will be interested in using the system


Table 1 User Groups


User Name Role

Executive management  Sponsor technological solutions to   cyber-attacks

IT manager   Plan and conduct assessment about systems   vulnerability

Employees   Apply the organization systems in service   delivery

Clients   Use the systems to access their needed   services and products

4.2. Functional Requirements

Functional requirements describe a particular behavior of function of the system when certain conditions are met. The solutions functional requirements are;

i. Adherence to administrative rules – users will need administrator password to install any program to the system. The adherence would be critical in handling the systems and be capable of avoiding preventable security breaches that are contributed by ignorance and non-adherence that would create to losses to more stakeholders. The administrative rules that include considering a framework of guidance of how strong passwords are developed is critical in assuring the other users and stakeholders that a good initiative is in place in achieving success. 

ii. Authentication – access to any system will require two-factor authentication (2FA). Authentication is critical to a system security and in this case SFA reduces the chances of a breach since the cyber-attacker would have two security framework that they have to venture and penetrate and the moment they are done with one results to an upgrade of the system and passwords pushing them to the drawing board. The functional approach increase security of the systems and makes the users confident in handling and protecting their data. 

iii. Authorization level – an authorization hierarchy will be established to guide on rights and privileges for system users. In an organization, there are the individuals in different positions that are authorized to access confidential information in the system. The restriction to a given individuals to access the system is best in increasing accountability and also minimize risks of data breach. There is also the procedure followed when an employee is leaving the organization to make sure that the authorized is changed to prevent them from manipulating the system or exposure of data to competitors of the firm after leaving. 

iv. Legal and regulatory requirements – all programs used will need to be authentic. No cracked programs to be installed in the system. In system development, there are individuals that developed the cracked version of the system for their own benefits and the best way to control the function is to prevent cracked versions through legal means. The persons found with the cracked version should be charged and this is only achieved when the organization goes the authentic way. 

v. Audit tracking – the system will be able to keep audit trail for all users. There is the need for an audit tracking that ensure that all users are under control and management to avoid those that might contribute to breaches through poor practices that can be prevented.

4.3. Non-Functional Requirements (NFRs)

The non-functional requirements define the quality and performance attributes of the solution 


Table 2 Non Functional Requirements


NFR Type


Implications on Design

and/or operation



· The solution   will be having the high ability to prevent security breaches.

· Successful   control security breaches is an assurance that organization would operate   during the business hours and outside the business hours without any   disruptions.

· The users will   be assured about the security of their data in the organization that makes it   viable to seek services from the organization.

· A system that   is secured protects the data of the clients that builds reputation and trust   to work together. 

· The data access   in the system after getting the solution will be on need to know basis. 

· The individuals   that will be accessing the system will be known and authorized to do so. 

· The approach   ensure that unauthorized persons are prevented from causing a breach. 

· The solution   brings about ease among the staff that are using the system. 

· Usability is   about how effective the users can learn to use the system.

· The solution   provides the easy use to the system including following administrative   strategies. 

· There is up to   97% reliability of the solution to the ‘ExternalBlue’ vulnerability. The term   "reliability" refers to both the probability and the percentage   that the program will continue to function correctly for a predetermined   number of times or for a set period of time.

· The system   would be operational 24/7 where it serves its functions attaining 97% of   effectiveness. .

· The system   would be relied upon by the users within the business hours and beyond. 

· There would be   an increase in the clients that seeks services from the organization due to   positive reputation.

· Limited   security issues when the solution is effective eliminate fines and charges   associated with breach of client data. 

· Integrity is   achieved when authorized persons access the system only.

· The integrity   of the data is about maintaining and assuring the consistency and accuracy   through all the lifecycle.

· The integrity   is achieved through good mechanisms that the system solution offers by   minimizing on breaches.

· A successful   usability is experienced through satisfaction of clients/customers.

· Efficiency in   security protection.

· The reliability dictates that the solution to   ‘ExternalBlue’ is the right intervention towards having a functional system   that performs its functions as expected. 



Data Integrity






5. System Design

The creation of a technological solution that complies with the system's functional requirements is the goal of the System Design phase of the software development life cycle. At this stage in the lifecycle of the project, there ought to be a Functional Specification that is primarily written in business terminology. This document ought to contain a comprehensive description of the operational requirements of the various organizational entities that will use the new system (Eian et al., 2020). The difficult task at hand is to convert all of this information into Technical Specifications that not only precisely define the layout of the system but also have the potential to be used as input during System Construction.

5.1. Solution Concept

Within the context of the system development lifecycle, the graphic that follows provides an illustration of all of the processes and deliverables associated with this phase. As part of the System Requirements Analysis process, a Functional Specification is developed, which is then converted into a physical architecture (Eian et al., 2020). The components of the system are dispersed over the physical architecture, useable interfaces are established and prototyped, and technical specifications are drafted for the application developers. This enables the application developers to construct and test the system.


5.2. Proposed System Architecture

A system's architecture is a description of its primary components, the relationships (structures) between those components, and the ways in which those components interact with one another. The architecture of a system can be thought of as its blueprint (Makrakis et al., 2021). It establishes a communication and coordination mechanism among the components of the system while also providing an abstraction for managing the complexity of the system. It defines a structured solution that may meet all of the technological and operational needs while simultaneously optimizing the common quality aspects, such as performance and security.

5.2.1 Alternative 1

The alternative 1 that the team chosen was an architecture that focuses on bringing about effectiveness and efficiency in the workplace and has a 50% effectiveness in terms of addressing the security issue. The alternative was worth until when the second alternative was drafted based on the blueprint. 

5.2.2 Alternative 2

The alternative is more promising to be adopted in the organization because it addresses the issues that is experienced in the system especially the ExternalBlue through the provision of an abstraction in the management of system complexity and coordination mechanism among components. 

5.2.3 Reason of Choosing the Alternative

My team chosen the second alternative because they consider that it carries simplicity and also secure. Architecture serves as a blueprint for a system. It provides an abstraction to manage the system complexity and establish a communication and coordination mechanism among components. It defines a structured solution to meet all the technical and operational requirements, while optimizing the common quality attributes like performance and security.


5.2.4 Production and Staging Environments

A testing environment that is referred to as a stage, staging, or pre-production environment is one that is designed to seem exactly like a production environment. It attempts to simulate a real-world production setting as accurately as possible and may establish connections to various production-related services, data, and resources, such as databases. There is a requirement for staging in order to determine whether or not the system is effective in terms of both its security and its functionality by means of conducting tests.

5.3. Component Design



Off shelf/Custom 



Processor – 2.8-3.0 GHz

Off the Shelf

Ryzen 5, 7


RAM – 4 GB per core

Off the Shelf



Standard Hard drive 

Off the Shelf

256 GB Solid State Drive


Oracle Enterprise Linux 4


To be able to autonomously work   with the specified hardware requirements 


Oracle Enterprise Linux 7

Off the Shelf


Oracle Solaris 10 (x86)


To be able to autonomously work   with the specified hardware requirements


5.3.1 Hardware Components

a. 4 Cores, 2.8-3.0 GHz each (2.8 GHz minimum speed)

b. 4 GB RAM per core

c. Standard hard drive, 100 GB free

d. Network connectivity









5.3.2 Software Components 

a) Oracle Enterprise Linux 4 Update 7 or greater, 64-bit

b) Oracle Enterprise Linux 5 Update 3 or greater, 64-bit

c) Oracle Enterprise Linux 6 64-bit

d) Oracle Solaris 10 (x86)

e) Red Hat Enterprise Linux 4.0 Update 7 or greater, 64-bit

f) Red Hat Enterprise Linux 5.0 Update 3 or greater, 64-bit User Interface – Web client

– Based on the system requirements listed in the previous sections, we present the system use case diagram as shown in  Figure x Use Case Description

For each of the identified use cases, we provide, in Table 3, a more detailed description. Use case description shows how users will interact with the solution. It describes, from a user’s point of view, the solution’s behavior as it responds to user requests. Back-End Database

The system will use the back-end database file system that ensure that the users experience a better usability when accessing data that they have already keyed. The back-end database is offering the possibility of accessing stored data especially for products ordered online guiding on delivery (Makrakis et al., 2021). 

4.4.Design Evaluation

Table 4 shows a comparison between the On-Cloud Option and the On-Site Option

Where do you want to host your system << on-cloud vs on-site and why>>

Table 4   


6. Implementation

In order to facilitate the understanding of the system that contains several major components, we start with high level architecture. The source code for this project is provided in Appendix C.

6.1 System Implemented Architecture

Figure 7 shows the major components of the system.  

Figure 7 High Level Implementation Architecture









6.2 Access Levels

When it comes to determining whether or not a user is allowed to interact with a software, public and private are two of the most prevalent access levels. In a third instance, a guarded, all members of the appropriate class are granted access. The solution ensure that only authorized system users are allowed to access the system and minimize breach. 




6.3 System Services or Functionalities

The system services/functionality include allowing data to be collected and stored in the electronic format that facilitate an easy access by the users. The system is needed to bring effectiveness and efficiency to the users through its functionality in processing data and creates a centralized platform. The system is designed that it carries best components and structure that helps in countering cybersecurity challenges and make it effective .


Testing, Analysis and Evaluation

7.1  Testing Methodology

The verification procedure concludes with system testing. These tests are used to see if all of the integrated components are working to their full potential. When it comes to evaluating whether a system can meet quality standards and adhere to all essential requirements, the testing procedure is critical. To ensure objectivity, testers who were not involved in the application's development are used to test this technique. This operation is also carried out in an atmosphere that is quite similar to that of the manufacturing phase. A critical part of the development process is system testing, which ensures that the application is meeting all of its functional, technical, and commercial goals. System testing is critical because it ensures that the application meets the customer's technical, functional, and business requirements. There are steps that are followed and this include the requirement analysis, software testing planning, environmental setup, test case development environmental setup and finally the execution test step. The test results are recorded based on the target system function, feature/functions and how they are working, and finally the functionality. The information is then recorded and documented and all this are done following the test schedule and later exit criteria is adopted last. 

7.2 System Analysis and Evaluation

System analysis and ev

Order this paper at


Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of 

Step 1

To make an Order you only need to click ORDER NOW and we will direct you to our Order Page at WriteDen. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
 Deadline range from 6 hours to 30 days.

Step 2

Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.


Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.