Complete report of your research project

Assignment Help Other Subject
Reference no: EM132376586 , Length: word count:2000

Task

In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:

• Overview of the technology involved
• Relevant technologies and applications of those technologies
• Highlighting the challenges/problems in your chosen research area
• Identification of any gaps in the literature by:
o discussing areas/issues that you believe have been addressed in the current literature;
o highlighting areas/issues that have not been addressed or adequately addressed; and
o discussing your view(s) on the issue(s) that you see as being critical.
• Summarize the future research directions based on the identified gaps

To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 5 research articles. Students are encouraged to access such research articles from well known and reputed research portals such as IEEE, ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations.

Rationale

This assessment task will assess the following learning outcome/s:
• be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
• be able to explain the fundamental concepts of cryptographic algorithms.
• be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
• be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
• be able to investigate and justify the use of the access control mechanisms and user authentication processes.
• be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.
This assessment continues links back to assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security.The aim of this task is to help students :
• to demonstrate ability to integrate and apply information from various topics;
• to build an understanding and perspective of current and emerging topics in Information Security;
• to help the students to formulate their research project in a step by step manner; and
• to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security

Reference no: EM132376586

Questions Cloud

How do you perform a disaggregation stage analysis : Engineering Postgraduate Project D-ENGG7808- University of Queensland-Australia-What is the regress Start Time, End Time and power average algorithm?
Describe a decision tree by using a business example : Describe a decision tree by using a business example. Please explain why the decision tree helps leaders make decisions. The response must be typed.
Influential methodology to study social systems : Agent-based modeling has been applied in many domains. Why are they becoming an influential methodology to study social systems?
What interview types did the person describe : What interview types did this person describe? For example, consider the screening, the selection, the group, the competitive, the panel.
Complete report of your research project : Summarize the future research directions based on the identified gaps - provide a complete report of your research project, that you chose in Assessment 3
Computes the sum of the elements of an input matrix a : EECS 138-MATLAB Programming-University of Kansas-US-Write a function called sum_perimeter that computes the sum of the elements.
Explain the short-term and long-term impact of this diabetes : Explain the Short-term and Long-term impact of this Diabetes Type#1 on patients. including effects of drug treatments. Be specific and provide Examples.
Describe the topic and identify two views on the issue : WRIT1001 Writing and Rhetoric: Academic Essays Assignment - Short Writing Tasks and Final Essay, The University of Sydney, Australia
Maintain a constant 6 percent growth rate : Afterwards, the company pledges to maintain a constant 6 percent growth rate in dividends forever. If the required return on the stock is 16 percent

Reviews

Write a Review

Other Subject Questions & Answers

  How can being observant show compassion and caring

How is listening an important element of a caring attitude, How can being observant show compassion and caring

  Explain the leadership from the department of public health

Determine the essential manner in which the leadership from the Department of Public Health, the School Board, and the various other government departments impacts the leadership of the City Manager's and his or her ability to carry out government..

  What was your personal response to the song

What was your PERSONAL response to the song? How does what you saw, heard and felt connect to the materials you've read in class

  Differentiate between leadership and management

Integrate key nursing leadership, management, and communication concepts into collaborative practice situations. Differentiate between leadership and management

  Major components of social structure are culture

The six major components of social structure are culture, social class, social status, roles, groups, and social institutions. Using a minimum of four of these components of social structure, write a 500 - 700 word paper to explain why African Americ..

  How did reading an indigenous peoples history of the us

How did reading An Indigenous Peoples History of the United States help provide you with an understanding of U.S. history and Democracy?

  Discuss the differences in costs and benefits of going

write a memo on a state not federal level business dispute. describe as if you were writing a white paper for your

  How the fourth amendment affects criminal justice process

Provide a detailed account of the Fourth Amendment, including a review of the background of the implementation of the Fourth Amendment.

  Was the scientific method followed and how

Ethics is always inclusive of research, as we must protect participants and be aware of appropriate methods for obtaining information.

  What were the objectives of this toxicity testing

How does the information apply to what you are learning in the course? What were the objectives of this toxicity testing? What were the endpoints of this toxicity testing?

  Find the critical dimensions of the core

A large cubic thermal reactor, moderated and reflected by an infinite reflector of water, is fueled with 235U at a concentration of 10-4g/cm3. Calculate the critical dimensions of the core.

  Describes why the factors you identified are important

Identify the top three to five (3-5) factors that would need to be considered when recruiting in your chosen region. Develop a persuasive closing summary that describes why the factors you identified are important

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd