Reference no: EM133002713
ITECH3100 Mobile and Cloud Security
Assignment - Vulnerability Investigation
Overview
In this assessment, you will be required to conduct a system vulnerability investigation on the smart system you choose for Assignment 1 and complete the whole technical report. The purpose of this assignment is for you to apply learning knowledge to real world applications, analyze the world application system in a way that generates valued insights, and think critically to seek solutions.
Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing.
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.
Assessment Details
1. Think of yourself as an examiner or auditor of the system from your Assignment 1, and Identify open issues and limitations of
the system by considering the following sample questions:
Are the assumptions reasonable and realistic? Is the solution practical?
Any technical errors and limitations? Any problems with the experiments? Do the results support the claims?
Any way to improve the work?
How does the work relate to other topics previously covered in class?
2. Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising Assignment 1 report according to the feedback received from lecturer, and extending Assignment 1 report to be in the following structure:
1). Abstract
2). Introduction (new functions and applications in Industry)
3). System Architecture (components, Internal and external connections, and key technologies)
4). Technological issues and problems
5). Threats, Vulnerability and Possible Attacks (need to use related standards, policy and guideline for this investigation)
6). Countermeasures
7). Experimental Attack Process (optional)
8). Conclusion (summary of your findings)
9). Reference (need to include the standards, policy and guideline you have used for above investigation)
Students can include at least two diagrams and/or tables to present your information in the report. Report should be 8-10 pages including title, abstract, and reference.
Technical report should be formatted in the ACM proceedings format. You may find the templates for word and LaTex
We recommend using the LaTeX Collaborative Authoring Tool on Overleaf Platform included on the above page that is particularly convenient for group projects.
Attachment:- Vulnerability Investigation.rar