Challenges in relation to mobile cloud computing

Assignment Help Other Subject
Reference no: EM133002713

ITECH3100 Mobile and Cloud Security

Assignment - Vulnerability Investigation

Overview
In this assessment, you will be required to conduct a system vulnerability investigation on the smart system you choose for Assignment 1 and complete the whole technical report. The purpose of this assignment is for you to apply learning knowledge to real world applications, analyze the world application system in a way that generates valued insights, and think critically to seek solutions.

Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing.
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.

Assessment Details

1. Think of yourself as an examiner or auditor of the system from your Assignment 1, and Identify open issues and limitations of

the system by considering the following sample questions:

Are the assumptions reasonable and realistic? Is the solution practical?
Any technical errors and limitations? Any problems with the experiments? Do the results support the claims?
Any way to improve the work?
How does the work relate to other topics previously covered in class?

2. Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising Assignment 1 report according to the feedback received from lecturer, and extending Assignment 1 report to be in the following structure:
1). Abstract
2). Introduction (new functions and applications in Industry)
3). System Architecture (components, Internal and external connections, and key technologies)
4). Technological issues and problems
5). Threats, Vulnerability and Possible Attacks (need to use related standards, policy and guideline for this investigation)
6). Countermeasures
7). Experimental Attack Process (optional)
8). Conclusion (summary of your findings)
9). Reference (need to include the standards, policy and guideline you have used for above investigation)

Students can include at least two diagrams and/or tables to present your information in the report. Report should be 8-10 pages including title, abstract, and reference.

Technical report should be formatted in the ACM proceedings format. You may find the templates for word and LaTex

We recommend using the LaTeX Collaborative Authoring Tool on Overleaf Platform included on the above page that is particularly convenient for group projects.

Attachment:- Vulnerability Investigation.rar

Reference no: EM133002713

Questions Cloud

Demonstrate key features of the system : Demonstrate key features of the system, and importantly your presentation should be sufficiently detailed to enable audiences to understand the existence
Find the price of a 5-month american put option : We want to price options using the binomial lattice. The current stock price is 105 and the strike price is 100. Assume that the stock up-trend rate is u=1.1 wi
What level of cover of each type of insurance should have : What level of cover of each type of insurance should she have (including the waiting and benefit periods for income protection, if recommended)
Dth services market cagr : DTH services market CAGR is 3.3% and it market capitalization is $1077 million Q) Find the NPV and IRR? Market Capitalization of online platforms expected to re
Challenges in relation to mobile cloud computing : Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising
Calculate annual holding period return : Suppose you purchase a 3-year, 5 percent coupon bond at par and hold it for two years. During that time, the interest rate falls to 4 percent.
Conduct a system vulnerability investigation : Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing - Audit different security threats involved in mobile cloud
What is the face value of an investment : What is the face value (present value) of an investment at 8% p.a., if at maturity (future value) in 180 days it will be worth $10,394.53
How long does take to grow to at least years : How long (full years and approximate months) does it take $135.00 to grow to at least years months $298.00 at 5.25% simple interest?

Reviews

Write a Review

Other Subject Questions & Answers

  Relationship with the customer

Why is Prius's success dependent on Toyota's relationship with the customer? Do you think Toyota has demonstrated their motto that "Customer is King/Queen" through development of the Prius? If so, how?

  Implement knowledge of HTML to a draft of a website

Implement knowledge of HTML and client feedback to a draft of a website. Based on your storyboard and client feedback, create three pages of your site

  What methods are scientists using to stop erosion on pelican

What methods are scientists using to stop the erosion on Pelican Island? Which ocean currents were most likely to have transported the shoes?

  What is suicide prevention

What is suicide prevention? Why are schools reluctant to implement suicide prevention programs particularly if there has not been a suicide or suicide attempt

  How you would leverage the model in your work environment

Determine how you would leverage this model in your work environment (or a past or future work environment). Determine which phase is the most important.

  Describe the aacn essentials in detail

Describe the relationship between the AACN Essentials and your new-found knowledge about Patient Centered Care. Are there opportunities for you to improve?

  Analytical understanding of performance and management

MN504 - Networked Application Management - Network Analysis using Wireshark - Melbourne Institute of Technology - Analyse performance and deployment issues

  Explain the causes of the undesirable aspects

Think of jobs you or someone you know has had. What was undesirable about these jobs? Was the pay too low? Hours too long? Were you treated poorly?

  Chance of survival in a life-threatening situation

Why does socio-economic status affect the chance of survival in a life-threatening situation? Is it related to social inequality?

  Review the principal goals of software design

Review the principal goals of software design such as Sufficiency, Understandability, Modularity, and so on. Pick any one or two goals

  What is your assessment of government involvement

Write a 350- to 525-word response to the following questions: What is your assessment of government involvement in community-based services and education?

  What is test purpose in relation to forensic setting or

what is a test purpose in relation to a forensic setting or a psychological test? define uses particularly in a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd