Analyze complex problems in network security

Assignment Help Management Information Sys
Reference no: EM131814913

Information Security Assignment-

Assignment Description - Overview of the assessment

Task 1: Critical Thinking

To develop skills to independently think of a situation and apply skills to analyze complex problems in network security under supervision. In this task, students will analyze a recent case in a chosen field. Based on his/her analysis, the student will find out the causes of the breach and will provide a plausible theoretical solution to resolve the case.

1.1. Description of the assessment:

This task consists of three steps - i) field selection ii) find a business case and iii) analyze the business case.

1.2. Field Selection

In the first step of the assignment, you have to select one of the fields listed below. You should choose your field in consultation with your lab tutor -

  • Software Defined Networking
  • Internet of Things
  • Cloud Network
  • Wireless Sensor Network

1.3. Finding a Case Study

In this step, you need to find a business case in your chosen field from last two years. The business case can be of two types -

  • A real world example, where a security breach occurs in your chosen field.
  • One IEEE Journal, where authors worked toward the security of your chosen field.

1.4. Analyzing the Business Case

Analysis depends on the type of your business case

1.4.1 - A Real World Example: If it is a real world example, you need to first write a summary of the case study in your own words. Then you need to clearly identify the security breaches that occurred. Finally, you have to provide a solution that should be taken in future by the respective organization to build a shield against such attacks.

1.4.2 - Research Article: You need to write a critical review of the journal that you have identified. The critical review includes - i) Summary of the Paper ii) Strength of the Paper iii) Weakness of the paper.

1.5. Report Writing Guideline

1. Please download the IEEE Conference Template

2. You need to use the template to write your report

3. The report should be in between 2-3 pages.

Section to be included in the report -

Abstract

Literature

Business Case/Journal article

Analysis of the business case or journal article

Conclusion

Reference

Reference no: EM131814913

Questions Cloud

Analyzing the effect on the income statement : Journalizing adjusting entries and analyzing their effect on the income statement The following data at July 31, 2016, are given for KTR.
Game in the extensive form : Represent the following game in the extensive form. There are three players, numbered 1,2,3. At the beginning of the game, players 1 and 2 simultaneously.
Determine the alternative treatment of prepaid expenses : Understanding the alternative treatment of prepaid expenses At the beginning of the year, office supplies of $800 were on hand.
Face and possible alternatives to resolve the issue : Use the Internet to identify a motor carrier and describe at least one issue they face and possible alternatives to resolve the issue.
Analyze complex problems in network security : NIT5140 Information Security Assignment. To develop skills to independently think of situation and apply skills to analyze complex problems in network security
Paragraph regarding training and development : Describe a method of knowledge management that you have been exposed to in an organization you worked for. Discuss what worked with this method
Prior to the transaction the company current ratio : This transaction will increase the company's current ratio if prior to the transaction the company's current ratio was
Describe a method of knowledge management : Describe a method of knowledge management that you have been exposed to in an organization you worked for.
Compare the ending balances of the t-accounts : Understanding the alternative treatment of unearned revenues At the beginning of the year, Dapper Advertising owed customers $2,400 for unearned revenue.

Reviews

len1814913

1/16/2018 12:18:19 AM

Australian student, need everything as per the guidelines, For 1.4 there is no word limit given on specification and for 1.5 it should be in 2-3 pages. You should work on your assignment progressively in full co-ordination with your tutor. Submission Guidelines: You will upload one file: Task 1 – A .pdf file, this will be checked through turnitin. Late submission of assignments will be penalised as follows: For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day. For assignments more than 5 days late, a penalty of 100% will apply. You should write a brief abstract that will provide a glimpse of your report.

len1814913

1/16/2018 12:18:14 AM

You should write a brief literature survey on your chosen field. Your literature survey should be supported by at least 3-4 research articles. In this section, you need to present the business case that you will analyze in this report. In this section, you should present your detailed analysis. Draw a conclusion. All references should be in IEEE style. Highly appropriate, innovative and excellently written. Background, aim and results are articulated concisely and clearly. Highly relevant and proportion to each other.

len1814913

1/16/2018 12:18:09 AM

Reflect the cognitive, technical and creative skills to investigate, analyse and synthesise the chosen field with appropriate illustration. Skilful use of high quality, credible, relevant sources to develop ideas. The business case/journal article is reviewed critically reflecting the technical and cognitive skills. Use of appropriate knowledge gained from the units and draw a clear map. Strong demonstration of technical skill to generate and evaluate complex ideas and concepts at the abstract level. Clear identification of strength or weakness of the article or strong theoretical framework of defence for business case underpinned by the appropriate technical knowledge. Skilful use of high quality, credible, relevant sources to develop ideas. Accurate citations and references using the appropriate style. All sources cited. Appropriate paraphrasing and use of direct quotes.

Write a Review

Management Information Sys Questions & Answers

  What are some of current issue and challenges in informatics

Mission, purposes, and history - What is the mission of AMIA? From what you read about AMIA, what more can you infer about what motivates and guides the organization's actions?

  How could it negatively impact the security of the users

As for the other three areas that will be covered in the paper. What are those trade agreements, why was it voted for, and how could it negatively impact the security of the users in the participated countries in the agreement

  Erp software selection criteriaobjectiveprovide some

erp software selection criteriaobjectiveprovide some experience with reviewing the wide range of selection criteria

  Discuss how organization can safeguard against legal issues

Discuss how the organization can safeguard against legal issues. Discuss some of types of social data that could potentially cause a problem for organization.

  Determine the selection of an operating system

What criteria must a new business use to determine the selection of an operating system?

  The implementation of wireless networks

Describe how organizations establish the five (5) COBIT IT governance focus areas: strategic alignment, value delivery, risk management.

  List and organize anticipated puzzlements and jottings

List and organize anticipated puzzlements and jottings. List 2-3 specific observations that you will need to make.

  Existing personnel could increase the value of this busines

existing personnel could increase the value of this business process.

  Explain about capacity requirement planning

PPQ Parts Manufacturing: Best Software for MRP, CRP and ERP Needs - Justify your recommendations by analyzing the pros and cons of each of the six software systems you evaluated to perform materials requirements planning (MRP), capacity requirement..

  Find elements of the existing network

Scenario: In analyzing the network performance at the Bedford Campus, one issue that has come to light is the insufficient network and server infrastructure.

  Explain why openid offers users greater convenience

Explain why OpenID offers users greater convenience and security than the current system. Would you consider using an identity provider to access content on the Web? Why or why not

  Describe the data and information utilized in your future

Describe the data and information utilized in your future career.Briefly summarize your future career. Summarize (describe) the data, aka "facts", that are collected and input into a computer system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd