Conduct a system vulnerability investigation

Assignment Help Other Subject
Reference no: EM133002711

ITECH3100 Mobile and Cloud Security

Assignment - Vulnerability Investigation

Overview
In this assessment, you will be required to conduct a system vulnerability investigation on the smart system you choose for Assignment 1 and complete the whole technical report. The purpose of this assignment is for you to apply learning knowledge to real world applications, analyze the world application system in a way that generates valued insights, and think critically to seek solutions.

Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing.
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.

Assessment Details

1. Think of yourself as an examiner or auditor of the system from your Assignment 1, and Identify open issues and limitations of

the system by considering the following sample questions:

Are the assumptions reasonable and realistic? Is the solution practical?
Any technical errors and limitations? Any problems with the experiments? Do the results support the claims?
Any way to improve the work?
How does the work relate to other topics previously covered in class?

2. Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising Assignment 1 report according to the feedback received from lecturer, and extending Assignment 1 report to be in the following structure:
1). Abstract
2). Introduction (new functions and applications in Industry)
3). System Architecture (components, Internal and external connections, and key technologies)
4). Technological issues and problems
5). Threats, Vulnerability and Possible Attacks (need to use related standards, policy and guideline for this investigation)
6). Countermeasures
7). Experimental Attack Process (optional)
8). Conclusion (summary of your findings)
9). Reference (need to include the standards, policy and guideline you have used for above investigation)

Students can include at least two diagrams and/or tables to present your information in the report. Report should be 8-10 pages including title, abstract, and reference.

Technical report should be formatted in the ACM proceedings format. You may find the templates for word and LaTex

We recommend using the LaTeX Collaborative Authoring Tool on Overleaf Platform included on the above page that is particularly convenient for group projects.

Assignment - Presentation

Overview
For this assessment task, you will be required to give a presentation for approximately 15 minutes on the topic you choose for Assignment 2.

Learning Outcome 1: Critically evaluate various types of trust in mobile cloud computing.
Learning Outcome 2: Distinguish different levels of security for mobile cloud computing.
Learning Outcome 3: Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing
Learning Outcome 4: Audit different security threats involved in mobile cloud.
Learning Outcome 5: Investigate current security issues and challenges in relation to mobile cloud computing.

Assessment Details

You are required to make a presentation for approximately 15 minutes on the topic you choose for Assignment 1 and 2. Your presentation should introduce the smart system with its functions, architecture, and key technologies used, include tables and/or graphs to demonstrate key features of the system, and importantly your presentation should be sufficiently detailed to enable audiences to understand the existence of different types of threats, vulnerabilities and possible countermeasures to secure the system.

You can prepare the presentation containing following headings;
1. Introduction (new functions and applications in Industry)
2. System Architecture (components, Internal and external connections, and key technologies)
3. Threats, Vulnerability and Possible Attacks (including consequences if possible)
4. Countermeasures
5. Conclusion (summary of your findings)

Attachment:- Mobile and Cloud Security.rar

Reference no: EM133002711

Questions Cloud

What level of cover of each type of insurance should have : What level of cover of each type of insurance should she have (including the waiting and benefit periods for income protection, if recommended)
Dth services market cagr : DTH services market CAGR is 3.3% and it market capitalization is $1077 million Q) Find the NPV and IRR? Market Capitalization of online platforms expected to re
Challenges in relation to mobile cloud computing : Summarize all threats, vulnerability or weak points of the system into a table, complete the whole technical report by revising
Calculate annual holding period return : Suppose you purchase a 3-year, 5 percent coupon bond at par and hold it for two years. During that time, the interest rate falls to 4 percent.
Conduct a system vulnerability investigation : Analyze and evaluate emerging technologies such as sensor and vehicular mobile cloud computing - Audit different security threats involved in mobile cloud
What is the face value of an investment : What is the face value (present value) of an investment at 8% p.a., if at maturity (future value) in 180 days it will be worth $10,394.53
How long does take to grow to at least years : How long (full years and approximate months) does it take $135.00 to grow to at least years months $298.00 at 5.25% simple interest?
Prepare a process cost report using the FIFO costing method : The ending work in process inventory was 21,600Kg. Prepare a process cost report using the FIFO costing method for the blending department for July
What are the sources of potential profit and loss : What are the sources of potential profit and loss for an active bond manager?

Reviews

len3002711

10/1/2021 2:07:14 AM

Assignment 1 - Solution attached we did already Assignment 2 – Vulnerability Investigation - 2300 Words Assignment 3 – Presentation [ 16 PPT slides in 500 words in Slide Content + Script ] This is first assignment this assignment is linked with this - 1 Sample also attached Report and presentation

Write a Review

Other Subject Questions & Answers

  Discuss social process theories

discuss one of the social process theories social learning, social control, or social reaction

  Challenges of defining and measuring quality

How can health care organizations address challenges of defining and measuring quality out comes? (cite your sources)

  Extra-legal factors influence sentencing decisions

The research is pretty clear: Extra-legal factors influence sentencing decisions. Some extra-legal factors are used unjustly, such as race

  Question about c+ programming functions program

Create a C function named change that accepts floating point number and the addresses of the integer variables named quarters, dimes, nickels, and pennies.

  What is the role of pleasure in maintaining the good life

What is the role of pleasure in maintaining the Good Life? Discuss three examples of how pleasure does not contribute to attaining the Good Life

  Describe crime fighting techniques and crimes

Describe crime fighting techniques and crimes that we will be facing that we don't today

  Humans sense of self is not single-one-dimensional construct

Some researchers argue that a human’s sense of self is not a single or one-dimensional construct but rather that people maintain possible or multiple selves. Possible selves are mental images that people have of themselves based on past experience..

  Criminal court system-define the dual court system

which you examine and evaluate the American criminal court system-Describe a court and its purpose. Define the dual court system.

  Create the proposal using the request for proposal form

Create a proposal that will be present to the functional manager of your organization detailing the steps that could be taking to mitigate the risk of data.

  What did samuel gompers mean when he said that women

What did Samuel Gompers mean when he said that women had to burn in order to spur government action on labor safety?

  Discuss how sexual orientation and gay rights rulings

Discuss how sexual orientation and gay rights rulings regarding marriage are being addressed in America and other parts of the world.

  What should the boy do about his sudden passion

18 year old male, athletic, intelligent and dedicated, will mayor in Chemistry and minor in Biology at the local college. Always liked science in high school and though he good at, disliked math. Played basketbal and swimming until recently.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd