Investigate attacks on anonymising networks  This assessment aims to assess the understanding of anonymising network inside the Dark Web using The Onion Router (TOR) and analysing the network traffic. This assessment task will also assess the following learning outcome of this subject as well as measuring progress towards all the learning outcomes: be able to investigate the usage of anonymising networks in the dark web using publically available tools Description:                                                                

Investigate attacks on anonymising networks 

This assessment aims to assess the understanding of anonymising network inside the Dark Web using The Onion Router (TOR) and analysing the network traffic. This assessment task will also assess the following learning outcome of this subject as well as measuring progress towards all the learning outcomes:

be able to investigate the usage of anonymising networks in the dark web using publically available tools

Description:                                                                 

In preparation for this assessment, you will be given a tour of the dark web and walked through the technical details of how it works. Using this knowledge and skill, you will explore how organisations can use the Darknet as a threat intelligence resource to proactively secure your organisation’s information in this assessment. You are required to prepare an anonymising network analysis report using the Tor browser based on the following scenario:

As a security specialist for an organisation, you are tasked with the early detection of potential threats and vulnerabilities such as data leaks and other cyber incidents that may damage your organisation’s reputation. The organisation’s web server has alerted you to suspicious activity. Initially, you investigated the security logs and completed all other security compliance procedures that could be the source of an entry that appeared suspicious but no malicious activity was detected. As part of your organisation’s security precautions and policies, you proceed to investigate the source of the suspicious activity by going to the hidden/secret site of the web by using available anonymising network tools.

Exploration of the dark web conditions: you may stumble upon the content you do not want to see, as part of the safety practices when exploring the Dark Web, it is expected that you stick to the purpose of this assessment task and look solely for sites relevant to the threat intelligence. In line with CSU’s duty of care, you will be required to capture how you used the safety protocols in your final report.

Your task:

You will access your network security logs (please make sure that you are not breaching the privacy if it is your workplace logs)
Your task is to access the Dark Web safely and anonymously using the Tor network through the Tor browser. The best way to keep yourself private you may combine Tor with a VPN. You will be required to describe how you have kept safe while exploring the Dark Web.
Navigate the Dark Web to discover suspicious activity by digging through search engines. You need to start with Tor browser to conduct the dark web investigations
Evaluate its routing protocols and security features. You should be able to describe the navigated hidden web traffic logs for your traffic analysis
In your report, you must include a description of the potential challenges of the Tor network concerning traffic analysis.

This assessment also provides an opportunity for you to :

– demonstrate factual knowledge, understanding and application of state-of-art of the anonymizing network;

– demonstrate the ability to investigate the usage of anonymising networks in the dark web

– apply understanding and knowledge to a practical situation;