Reference no: EM133002711
ITECH3100 Mobile and Cloud Security
Assignment - Vulnerability Investigation
Overview
In this assessment, you will be required to conduct a system vulnerability investigation on the smart system you choose for Assignment 1 and complete the whole technical report. The purpose of this assignment is for you to apply learning knowledge to real world applications, analyze the world application system in a way that generates valued insights, and think critically to seek solutions.
Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing.
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.
Assessment Details
1. Think of yourself as an examiner or auditor of the system from your Assignment 1, and Identify open issues and limitations of
the system by considering the following sample questions:
Are the assumptions reasonable and realistic? Is the solution practical?
Any technical errors and limitations? Any problems with the experiments? Do the results support the claims?
Any way to improve the work?
How does the work relate to other topics previously covered in class?
2. Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising Assignment 1 report according to the feedback received from lecturer, and extending Assignment 1 report to be in the following structure:
1). Abstract
2). Introduction (new functions and applications in Industry)
3). System Architecture (components, Internal and external connections, and key technologies)
4). Technological issues and problems
5). Threats, Vulnerability and Possible Attacks (need to use related standards, policy and guideline for this investigation)
6). Countermeasures
7). Experimental Attack Process (optional)
8). Conclusion (summary of your findings)
9). Reference (need to include the standards, policy and guideline you have used for above investigation)
Students can include at least two diagrams and/or tables to present your information in the report. Report should be 8-10 pages including title, abstract, and reference.
Technical report should be formatted in the ACM proceedings format. You may find the templates for word and LaTex
We recommend using the LaTeX Collaborative Authoring Tool on Overleaf Platform included on the above page that is particularly convenient for group projects.
Assignment - Presentation
Overview
For this assessment task, you will be required to give a presentation for approximately 15 minutes on the topic you choose for Assignment 2.
Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.
Assessment Details
You are required to make a presentation for approximately 15 minutes on the topic you choose for Assignment 1 and 2. Your presentation should introduce the smart system with its functions, architecture, and key technologies used, include tables and/or graphs to demonstrate key features of the system, and importantly your presentation should be sufficiently detailed to enable audiences to understand the existence of different types of threats, vulnerabilities and possible countermeasures to secure the system.
You can prepare the presentation containing following headings;
1. Introduction (new functions and applications in Industry)
2. System Architecture (components, Internal and external connections, and key technologies)
3. Threats, Vulnerability and Possible Attacks (including consequences if possible)
4. Countermeasures
5. Conclusion (summary of your findings)
Attachment:- Mobile and Cloud Security.rar