The purpose of this assignment is to develop skills to independently think ofinnovation. Students will be able to complete the following ULOs:c. Explain the major methodologies for secure networks and what threatsthey address;d. Identify and report network threats, select and implement appropriatecountermeasures for network security.Assignment DescriptionNew World Consulting Services (NWCS) provides security consulting and services to over 200 clientsacross a wide range of enterprises in Australia. A new initiative at NWCS is for its two offices in Sydneyand Melbourne to provide internships to students who are pursuing their studies in reputed institutesin Sydney and Melbourne in the field of Networking.To evaluate suitable candidates for this prestigious internship program, NWCS has asked applicantsto prepare a detailed report and a presentation addressing the following sections:A. Preventing Vishing Attacks (maximum 500 Words)Vishing, or voice phishing, continues to increase as an attack against users. What would youdo to help prevent users from becoming victims? First, access the online SoundCloudrepository by NumberCop that contains several different recordings for vishing attacks(https://soundcloud.com/numbercop). After listening to several of the recordings, based onyour analysis address following:1. What attackers typically ask and how they craft their attacks?2. What messages do the attacker commonly use?3. How do they trick users into entering the information?4. Write your recommendations that would help users resist these attacks.B. Lightweight Cryptography (maximum 500 Words)Cryptography can provide protection to data in three states: data-in-use, data-in-transit anddata-at-rest. Due to the importance of incorporating cryptography in low-power devices, anew “subfield” of cryptography is being developed called lightweight cryptography. This hasgoal of providing cryptographic solutions that are uniquely tailored for low power devices thatneed to manage resource vs. security constraints. Research lightweight cryptography andaddress following:1. What are its goals? Who is behind it?2. Will it be standardised? When will it appear?3. One practical networked application area that will use lightweight cryptography.C. Network Firewall Comparison (maximum 500 Words)Research two network firewalls. Your discussion must include1. the importance of the Firewall from information security point of view.2. comparison of features of selected firewalls (using Table)3. additional features they include (IDS, content Filtering, etc.)4. your recommendation based on your analysisD. Compare Port Scanners (maximum 500 Words)Most communication in TCP/IP networks involves the exchange of information between aprogram running on one system (known as a process) and the same, or a correspondingprocess, running on a remote system. TCP/IP uses numeric value as an identifier to theapplication and services on these systems. This value is known as the port number.Unit Code: BN200 Unit Name: Network Security Fundamentals Page#3 of 4Prepared by: Dr Wanod Kumar Moderated by: Dr S M Farhad April, 2019Use the library resources to locate two port scanner applications that you can download toyour/lab computer on Virtual machine (Kali Linux /Windows 8.1 Professional) in Virtual Box.Install and run each application and examine the results. Based on your study, addressfollowing in this report1. Analyse and discuss the importance of port scanners2. Include the snap shots related to port scanning using both applications3. Identify and discuss the strengths and weakness of each scanner4. Which scanner would you recommend? Justify your recommendation.E. ReferencesMust consider at least five current references from journal/conference papers and books.Must follow IEEE Transactions on Networking style.Note: Every group will create a 7-10 minutes presentation and present their work front of yourclass fellows and tutor during the Lab in Week 12.