Conduct a system vulnerability investigation

Assignment Help Other Subject
Reference no: EM133002711

ITECH3100 Mobile and Cloud Security

Assignment - Vulnerability Investigation

Overview
In this assessment, you will be required to conduct a system vulnerability investigation on the smart system you choose for Assignment 1 and complete the whole technical report. The purpose of this assignment is for you to apply learning knowledge to real world applications, analyze the world application system in a way that generates valued insights, and think critically to seek solutions.

Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing.
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.

Assessment Details

1. Think of yourself as an examiner or auditor of the system from your Assignment 1, and Identify open issues and limitations of

the system by considering the following sample questions:

Are the assumptions reasonable and realistic? Is the solution practical?
Any technical errors and limitations? Any problems with the experiments? Do the results support the claims?
Any way to improve the work?
How does the work relate to other topics previously covered in class?

2. Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising Assignment 1 report according to the feedback received from lecturer, and extending Assignment 1 report to be in the following structure:
1). Abstract
2). Introduction (new functions and applications in Industry)
3). System Architecture (components, Internal and external connections, and key technologies)
4). Technological issues and problems
5). Threats, Vulnerability and Possible Attacks (need to use related standards, policy and guideline for this investigation)
6). Countermeasures
7). Experimental Attack Process (optional)
8). Conclusion (summary of your findings)
9). Reference (need to include the standards, policy and guideline you have used for above investigation)

Students can include at least two diagrams and/or tables to present your information in the report. Report should be 8-10 pages including title, abstract, and reference.

Technical report should be formatted in the ACM proceedings format. You may find the templates for word and LaTex

We recommend using the LaTeX Collaborative Authoring Tool on Overleaf Platform included on the above page that is particularly convenient for group projects.

Assignment - Presentation

Overview
For this assessment task, you will be required to give a presentation for approximately 15 minutes on the topic you choose for Assignment 2.

Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.

Assessment Details

You are required to make a presentation for approximately 15 minutes on the topic you choose for Assignment 1 and 2. Your presentation should introduce the smart system with its functions, architecture, and key technologies used, include tables and/or graphs to demonstrate key features of the system, and importantly your presentation should be sufficiently detailed to enable audiences to understand the existence of different types of threats, vulnerabilities and possible countermeasures to secure the system.

You can prepare the presentation containing following headings;
1. Introduction (new functions and applications in Industry)
2. System Architecture (components, Internal and external connections, and key technologies)
3. Threats, Vulnerability and Possible Attacks (including consequences if possible)
4. Countermeasures
5. Conclusion (summary of your findings)

Attachment:- Mobile and Cloud Security.rar

Reference no: EM133002711

Questions Cloud

What level of cover of each type of insurance should have : What level of cover of each type of insurance should she have (including the waiting and benefit periods for income protection, if recommended)
Dth services market cagr : DTH services market CAGR is 3.3% and it market capitalization is $1077 million Q) Find the NPV and IRR? Market Capitalization of online platforms expected to re
Challenges in relation to mobile cloud computing : Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising
Calculate annual holding period return : Suppose you purchase a 3-year, 5 percent coupon bond at par and hold it for two years. During that time, the interest rate falls to 4 percent.
Conduct a system vulnerability investigation : Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing - Audit different security threats involved in mobile cloud
What is the face value of an investment : What is the face value (present value) of an investment at 8% p.a., if at maturity (future value) in 180 days it will be worth $10,394.53
How long does take to grow to at least years : How long (full years and approximate months) does it take $135.00 to grow to at least years months $298.00 at 5.25% simple interest?
Prepare a process cost report using the FIFO costing method : The ending work in process inventory was 21,600Kg. Prepare a process cost report using the FIFO costing method for the blending department for July
What are the sources of potential profit and loss : What are the sources of potential profit and loss for an active bond manager?

Reviews

len3002711

10/1/2021 2:07:14 AM

Assignment 1 - Solution attached we did already Assignment 2 – Vulnerability Investigation - 2300 Words Assignment 3 – Presentation [ 16 PPT slides in 500 words in Slide Content + Script ] This is first assignment this assignment is linked with this - 1 Sample also attached Report and presentation

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd