Reference no: EM131052090 , Length: word count:2000
Task
Below are listed a list of topics. You are required to -
• Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions... etc.)
• Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly.
• Raise questions about the information provided by other students (this must be done in an adequately professional manner)
• Respond to questions raised about your own information and other student's
• Contribute to discussions in general
Note that the aim of this task is:
1. to build an understanding and perspective of current hot topics in Information Security; and
2. to build generic skills including, but not limited to:
• a capacity for teamwork and collaboration;
• an ability for critical thinking, analysis and problem solving;
• information technological literacy;
• a capacity for lifelong learning and an appreciation of its necessity.
As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.
Topics Set
1. US cryptography export restrictions: past, present, and future.
2. Biometrics for authentication: security and privacy implications.
3. Denial of service and distributed denial of service attacks.
4. Malware: past, present and future.
5. Employee privacy and email, WWW, and instant messaging.
6. Security threats to mobile devices and countermeasures.
7. Security threats in cloud computing and preventive methods.
8. Security threats in smart devices.
9. Data Exfiltration.
10. Wireless Network security and preventive methods.
11. Security issues in Software Defined Networks (SDN)
12. Security and privacy issues in Internet of Things (IoT)
Your submission:
You are required to prepare and submit a report on your topic to address the following questions (the length of the report within 1500~2000 words, excluding references):
a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.
b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.
c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.
d. Discuss the impact of the above mentioned issues and their application/impact in real life.
e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.
f. Provide references (at least three) using APA referencing system including in text citations.
2000 words.
20 apa reference.
Sticklebacks to evolve complete armor quickly
: Evolution of a new trait typically takes many generations. Yet a dramatic shift in the extent of armor plating the the lake Washinton stickleback population occurred in the 50 years following the cleanup of the lake. Which of the following best de..
|
Identify net cash from operating activities
: Identify net cash from operating activities for the year of 2014 & 2013. Identify net cash used in investing activities for the year 2014 & 2013. Identify net cash from financing activities for the year 2014 & 2013.
|
What are the ethical issues raised by this procedure
: Compare your reactions to that procedure with your reactions to an analogous one in which people are given false feedback that they possess a very favorable personality trait or a very high ability level.
|
Using the internet as an access point
: Select a publicly traded company of interest to you. Using the Internet as an access point, _nd the following for the previous year: (1) annual sales, (2) pro_ts as a percentage of sales, e.g.
|
Brief supportive descriptions to post on the forum
: Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog
|
Determining the peer-review study
: Using the Kaplan library, identify a peer-review study that uses a statistical analysis, such as regression, ANOVA, or t test.
|
Is there any deception involved
: The investigator observes the responses of those receiving the gaze. What ethical considerations, if any, do you perceive in this field experiment? Is there any deception involved?
|
Experiment work with other plant cells
: 1. Did water flow in or out of the plant cells(potato cell)in each of the samples examined? How do you know this? 2. Would this experiment work with other plant cells? What about with animal cells? Why or why not?
|
Both parallel products and substitutes
: A business that faces both parallel products and substitutes is likely to have a difficult time in the marketplace. Example of businesses that have both parallels and substitutes include grocery stores.
|