Analyse and discuss common emerging threats

Assignment Help Basic Computer Science
Reference no: EM132206264

Purpose of the assessment (with ULO Mapping)

Students should be able to demonstrate their achievements in the following unit learning outcome:

b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems

Assignment Description

The majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms could not be implemented in the low-power devices used in applications such as automotive systems, sensor networks, healthcare, distributed control systems, the Internet of Things (IoT), cyber-physical systems, and the smart grid. Security and privacy is important in all of these areas. The lightweight cryptography has the goal of providing cryptographic solutions that need to maintain the resource vs security constraint.

In this context write a report including the following sections:

A. Introduction about the lightweight cryptography and its goals
B. The potential security threats in systems using low-power devices
C. The working mechanism of lightweight cryptography
D. Performance metrics (Hardware-specific metrics and Software-specific metrics)
E. Lightweight cryptographic algorithms
F. Current and Future challenges in lightweight cryptography
G. Conclusion
H. References

The Viva voce of the assignment will take place during Laboratory session in Week 7. The student has to answer the viva questions related to the assignment.

Assignment Instructions:

- Do not use Wikipedia as a source or a reference
- Must consider at least five current references from journal/conference papers and books. Must follow IEEE referencing style.
- Make sure you properly reference any diagrams/ graphics used in the assignment.

Reference no: EM132206264

Questions Cloud

What is the total required initial investment cost : What is the total required initial investment cost (cash outlay) associated with the new manufacturing process? What is the estimated payback period
Create a matrix that explains leadership theories : As a leader, you often need to display or clarify a concept. A matrix is a grid that contains information and offers a visual model of ideas.
What would be the value for this property today : Assume that the investment company expects to own the property for 10 years and then sell it, what would be the value for this property today
Articulate elements of leadership : Articulate elements of leadership. Examine your individual, essential elements of leadership and management.
Analyse and discuss common emerging threats : MN502 - Overview of Network Security - Lightweight cryptography - Analyse and discuss common emerging threats, attacks, mitigation and countermeasures
How can one reconcile the performance of small stocks : How can one reconcile the performance of small stocks and value stocks with the EMH? Is the existence and success of DFA consistent with the EMH
Discuss union avoidance strategies by management : Identify and discuss in detail the steps in a secret ballot representation election. Who initiates this process? Explain.
Identify project evaluation and control processes : Within the parameters of the project schedule, discuss the resource allocations and monitoring processes.
Describe what are the three types of efficiency : PRINCIPLES OF INVESTMENT ASSIGNMENT- Describe what are the three types of efficiency and mention why they are important to understand modern finance

Reviews

len2206264

1/2/2019 8:50:13 PM

References /5 Clear styles with excellent source of references. Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors. Viva voce /10 Answered all the questions appropriately and accurately Answered all the questions with some clarity Answered all the questions with little in-depth knowledge Answered about 50% of the questions. Answers were irrelevant

len2206264

1/2/2019 8:50:08 PM

Excellent Very good Good discussion Brief discussion Algorithms /10 discussion about two lightweight cryptographic discussion about two lightweight cryptographic about two lightweight cryptographic about two lightweight cryptographic Unsatisfactory discussion algorithms algorithms algorithms algorithms Challenges /10 A very clear and in-depth discussion Very clear discussion Generally good discussion Brief discussion Poor discussion with irrelevant information Conclusion /5 A section very clearly concludes the overall contribution. A section clearly concludes the overall contribution. Generally good conclusion of the report Brief conclusion of the report with some relevance Conclusion not relating to the report

len2206264

1/2/2019 8:50:00 PM

Working Mechanism /08 A very detailed and very clear working mechanism of the lightweight cryptography Very clear working mechanism of the lightweight cryptography Generally good discussion about working mechanism of the lightweight cryptography Brief discussion about working mechanism of the lightweight cryptography Poor discussion with irrelevant information An in-depth and Performance Metrics /10 very clear discussion about the performance Very clear discussion about the performance metrics Generally good discussion about the performance metrics Brief discussion about the performance metrics Irrelevant discussion about the performance metrics metrics

len2206264

1/2/2019 8:49:54 PM

Example Marking Rubric for Assignment #: Total Marks 80 Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction /10 A very detailed and very clear discussion A well written and clear discussion . Generally good discussion . Very brief discussion and missing report outline Poor Introduction with irrelevant details Potential Security threats /12 A very clear and in-depth discussion about three potential threats Very clear discussion about three potential threats Generally good discussion about three potential threats Brief discussion about the potential threats Poor discussion about potential threats with irrelevant information

len2206264

1/2/2019 8:49:17 PM

References Must follow IEEE style 05 Viva voce Student must appropriately answer the viva questions related to the assignment. 10 Total Marks 80

len2206264

1/2/2019 8:49:07 PM

Performance Metrics Discuss in detail the performance metrics • Hardware-specific metrics • Software-specific metrics 10 Algorithms Explain any two lightweight cryptographic algorithms from current literature 10 Challenges Current and Future challenges in lightweight cryptography 10 Conclusion This section concludes the overall findings and contributions of the report 05

len2206264

1/2/2019 8:49:01 PM

Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction Introduction about the lightweight cryptography and its goals. This section should also describe the report outline. 10 Security Threats Discuss three potential security threats in systems using low- power devices 12 Working Mechanism The working mechanism of lightweight cryptography 08

len2206264

1/2/2019 8:48:56 PM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Basic Computer Science Questions & Answers

  Show the consumer and producer surplus in the figure

Show the consumer and producer surplus in the figure, and explain what these terms mean.

  Concepts of the little man computer

Write a Little Man program that prints out the sums of the odd values from 1 to 29. The output will consist of 1, 1+ 3, 1 + 3 + 5, 1 +3 + 5 + 7.... Use the concepts of the Little Man Computer introduced in Lecture 4 only.

  Effect of taxes on the consumption of cigarettes

The Premier is wrong about the effect of taxes on the consumption of cigarettes. Now that the tax on cigarettes is lower it is true that the demand.

  Advantages and disadvantages of using this tool in education

Provide a literature review for the Laptop (include information about the tool, other studies that might have used it

  Draw a uml domain class diagram

Draw a UML domain class diagram to represent the following home automation system. You must show all the classes, the associations between them and the multiplicities.

  Find out more about unified communications and its costs

What factors should be considered? What are the key decisions that must be made in determining whether to adopt this technology? Use the web, if necessary, to find out more about unified communications and its costs.

  What is wrong with the given while repetition statement

What's wrong with the following while repetition statement (assume z has value 100), which is supposed to calculate the sum of the integers from 100 down to 1?

  What kind of variable is the researcher studying

Stress. A medical researcher measures the increase in heart rate of patients under a stress test. What kind of variable is the researcher studying?

  Create a footer with the sheet name code in the center

Create a footer with the sheet name code in the center

  Contribute to slowing disk performance

What do you think are some of the main things that contribute to slowing disk performance? How might you address these issues?

  What is net neutrality

What is 'Net Neutrality'? Are you a critic or supporter of net neutrality? Why/why not?

  Write method called swappairs accepts string as parameters

Write a method called swapPairs that accepts a String as a parameter

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd