Application of principle of mobile security techniques

Assignment Help Other Subject
Reference no: EM132726447

Part C (Mobile Security Report)

This coursework allows you to extend your knowledge and understanding of a particular security-related topic presented during the taught component of the module.

SYNOPSIS
The overall aim of this coursework is to write a technical paper on the application of principle of mobile security techniques to a well-defined area within the area of mobile computing domain, including a case study. This will also comprise a discussion of social and ethical issues in your chosen mobile application.

For suitable security techniques, you may select techniques presented during the lecture (e.g. security assessment, key management protocols or cryptographic techniques) or choose a technique of your choice provided you have it approved by the coursework setter.
The following areas of mobile security can be used as application mobile domains: mobile ad-hoc networking, mobile health, mobile cloud, mobile banking, mobile learning or mobile social networking. You may choose a different area, but please consult with the module teaching team in order to assess its suitability.

The case study must present either an existing research prototype, commercial system or your own original idea.
The application domain should not be based on a case study, involving a real organisation, without the written permission from a senior person within the organisation and this written permission must be appended to the report. If you are using a real organisation, make sure you are not including any confidential information in your coursework report and contact the module leader to arrange additional precaution measures.
Your discussion of social and ethical issues should identify one pertinent aspect that may be seen as a security or privacy-related threat in the application area, illustrate its relevance for the case study, and suggest some ideas for its mitigation.

REPORT STRUCTURE
The report must contain a title, abstract, key terms, introduction section, main body and a conclusion. In addition to this, full references are required as are captions for all illustrations and tables. You should include your affiliations with the report, i.e. your name, School and University, MSc course and K-number. The IEEE conference Microsoft Word template can be found online and is also available on Canvas for this report and must be followed.
The abstract should summarize the scope of the paper in no more than 150 words. The report must be 4 pages (this is approximately 3000 words in length, using the 2-column IEEE format and font size prescribed by the template).
Please pay attention to the marking scheme as a further guidance for content that you should include in the main body of the report.
References should take the following form: full list of authors (i.e. not ‘et al.'), title of paper/book, title of journal (publisher if a book), year of publication, volume number and first and last page numbers. If you are using a Web reference, the full URL must be included along with the date of access. The referencing should be done using the Vancouver referencing style

Remember that this is to be a technical report, so make sure the contents are presented in a format suitable for publication in a technical conference or journal.

ASSESSMENT CRITERIA
This coursework component contributes to 60% of the overall available module marks. The marking scheme of this assignment is based on several components with corresponding weights, given as follows:
• Synopsis (Title, Abstract and Keywords
• Content (Scope and Technical Accuracy, Logical Coherence, Balanced Addressing of Security Technique and Mobile Application Domain, Case Study, Clarity of Expression and Explanations)
• Critical Analysis (Suitability and Justification of Selected Security Technique, Synthesis of Theory and Practice, Discussion of Social and Ethical Aspects)
• Presentation (Use of Language, Adherence to Formatting Instructions, Quality of Diagrams, Use of References)
• Conclusion (Summary of Work, Outlook)

Reference no: EM132726447

Questions Cloud

Consider your growth in effective speaking skills : Reflect on your previous speeches and self-reviews and consider your growth in effective speaking skills.
Basic medical care for homeless and indigent patients : Columbia Needycare is a clinic in south Florida that provides basic medical care for homeless and indigent patients.
How useful was the cost information : Based on your chosen costing article, briefly summarise how the costing system was designed and implemented in your real-life organisation.
Discuss the legislative and regulatory context : Research an Australian organisation and discuss the legislative and regulatory context and Explain the objectives, plans and strategies of an Australian
Application of principle of mobile security techniques : Write a technical paper on the application of principle of mobile security techniques to a well-defined area within the area of mobile computing domain
Discussion of security aspects of the mobile app : The presentation and analysis of the security features of your app needs to justify the strengths of the security that your implementation
Create any type of mobile android application : Awareness of appropriate software development methodologies and evidence of testing (including that of security features) needs to be demonstrated.
Create a secure mobile application : Create a secure mobile application (`app') based on the Android platform, and to demonstrate and explain its functionality and security features
What amount should newport report for depreciation expense : Newport's year-two financial statements. What amount should Newport report for depreciation expense on the machine in the year-two financial statements?

Reviews

Write a Review

Other Subject Questions & Answers

  Suppose there were a species of mammal

Suppose there were a species of mammal in which the visual receptors sent their individual impulses directly back to the brain instead of sending them to bipolar and ganglion cells which converged inside the eyeball. This change in anatomy would e..

  Professional summary for community stakeholders

Present the findings in a 1-page professional summary for community stakeholders, including a graph of the data.

  How is race as a concept different than ethnicit

Be sure to present the competing definitions presented in class. And, how is Race as a concept different than Ethnicit. Explain the debate between those in our society who present a biological determinism and those who argue social constructionis..

  Strategic alliances and network structures

Describe the advantages of strategic alliances and network structures as recent innovations in organizational architecture.

  What cultural differences do you share with this family

What cultural differences and similarities do you share with this family, and what might you need to learn more about to gain an understanding of the family's situation so you can appropriately assist its members?

  What was the intended purpose of the gatekeeper system

What was the intended purpose of the "gatekeeper" system? Based on what you've read, do you believe it has achieved its purpose? Why or why not?

  Discuss gender-specific terms are becoming less common

It seems that these gender-specific terms are becoming less common. Can you think of examples and the words that have replaced them

  What factors accounted for preeminence

The Netherlands has basically no natural resources, yet its per capita GDP was the highest in the world during the eighteenth century.

  Inspire the team to achieve high goals

explain why you characterized him or her as inspiring or uninspiring. You must use information presented in the course materials or outside sources, which you reference, to make your determination.

  Describe the cause and symptoms of the disease

Does the disease present a significant problem for the human population globally, or is it localized?

  Examples of structural violence within the family

Paul Farmer's definition of structural violence is “Structural violence is one way of describing social arrangements that put individuals and populations in harm’s way…

  Social media and psychology capstone in psychology

Write your chosen methodology, design, and data-collection tools as needed. Also, define the process from the selection of participants (and stakeholders as applicable) through data collection to data analysis, including any limitations, delimiter..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd