Critical understanding of the security risks

Assignment Help Other Subject
Reference no: EM132747341

Mobile Systems and Cybersecurity

Scenario

AMY Networks is a consultancy business that designs, installs and operates different types of wireless and wired networks for businesses and research organisations. As one of their project leaders you have been asked to respond to an ITT (Invitation to Tender) for this network design. The network solution will include the wireless sensor network logical design along with protocols specifications.

The ITT document is included with this ICA. The tender that you produce in response to the ITT should take the following form.

Part 1

You need to respond to the ITT with following documents: -
• Logical Design: Wireless sensor network.
o Logical layout of the WSN deployment (You must show the overall connectivity between the different network elements).
o Design an addressing scheme for WSN(for example IPv6 equivalent).

Part 2 - Design Report (4000 words)

The report must provide
• Description for the protocols you have chosen for the wireless sensor network and how they will prolong the network life time (Restrict discussion to Routing, MAC and Physical Layer) (20%).
• Enhanced security solution for the network including identification and mitigation of the security risks (30%).
• Conclusion/Reflection:
- Realistic and insightful conclusions drawn from the research.
- A full discussion about the nature of future developments should be included (20%).

The discussion should include a plan for integrating the different network protocols into the new network design. Your discussion must be supported by published research or simulation.

Part 3 - Presentation
Marks will be awarded for the overall presentation of your work. Your work should be of a professional standard.

Learning Outcomes

Personal and Transferable Skills
1. Appraise the technologies that are used to develop wireless based networks.
2. Evaluate and compare the various mechanisms that are used to ensure effective communication between mobile devices and the real-world.

Research, Knowledge and Cognitive Skills
3. Demonstrate a comprehensive and critical understanding of the security risks that are associated with a range of mobile devices and formulate suitable strategies for protection of the data held by them.
4. Research, assess and evaluate the complex relationships which exist between these technologies in real-world mobile devices.
5. Integrate and synthesise diverse knowledge, evidence concepts, theory and practice in wireless communications, to solve problems.
6. Critically appraise the networking technologies that are currently used by mobile devices.

Professional Skills
7. Demonstrate a comprehensive knowledge of the hardware technologies that are currently used by mobile devices.

Attachment:- Mobile Systems and Cybersecurity.rar

Reference no: EM132747341

Questions Cloud

Native OS firewalls to special-purpose devices : Firewall options for the individual or for those running a small office range from native OS firewalls to special-purpose devices.
Which goods that are completed in the production process : Which goods that are completed in the production process of a manufacturing business? Decrease finished goods inventory and increase cost of goods sold
What is the profit or loss associated with Copper : Allocate the joint costs using relative weight. With these costs, what is the profit or loss associated with Copper
What is the net advantage to leasing from company : Should you lease or buy it? What is the net advantage to leasing from your company's standpoint?
Critical understanding of the security risks : Mobile Systems and Cybersecurity - Evaluate and compare the various mechanisms that are used to ensure effective communication between mobile devices
Discuss the current types of stock : The purpose of this assignment is to analyze stockholders' equity to recommend strategies for generating cash. Understanding a company's position
What the eoq for model b is : What the EOQ for Model B is? The following information has been recorded for Model B manufactured by JKL Enterprises Average inventory level of Model B300
Review the material on routers : Since information extracted from router or switch interfaces to not provide specific evidence of a particular crime in most cases,
What are the risks associated with capital budgeting : What are the risks associated with capital budgeting and the three that are the most significant risks.

Reviews

Write a Review

Other Subject Questions & Answers

  Do the results stand alone

Why did the authors use this t test? Do you think it's the most appropriate choice?Why or why not? Did the authors display the data?

  What is value migration

What is value migration, how does it typically occur, what are its symptoms and briefly describe how it has affected different industries over time.provide 3 specific examples of industries (or significant key player companies) where value migration ..

  Collect and assess data about yourself and colleagues

How I will apply the theories, models, experiences, data and ideas from the OBA module in my future work - provide all the data that you have collected

  Describe in detail about all the machine models

Describe in detail about all the machine models we have discussed, including FA, DFA, NFA, PDA, DPDA, NPDA, TM, DTM, NTM, and UTM. What are they?

  Responding with cultural sensitivity

Remember, you are not being asked to solve the client's problem, but you are being asked to identify cultural factors, considerations, and facts about your client's culture and/or subgroup that will aid you in responding with cultural sensitivity.

  Are our lawmakers headed in the right direction

An examination of the history of probation and parole reveals many changes in the way this country has managed its criminal offenders.

  What is your personal stance on the current state of victims

What is your personal stance on the current state of victims' rights in America? Do you believe that the 2004 Crime Victims' Rights Act (CRVA) has been successful? Explain.

  Does henry have an enforceable legal agreement with star

Barb and Ned exchange e-mails in which Barb agrees to paint Ned's house for $1,000. Which of the following statements is true?

  How has experience or lack of it shaped your view of death

How often do you engage with or witness death in your work? How has this experience or the lack of it shaped your view of death? Has it gotten easier.

  Explain the nature of ethical issues

Explain the nature of ethical issues and apply a professional code of ethics to workplace situations - Competency 2: Critically examine the contributions of key thinkers from the history of ethics. -Assess the advantages and disadvantages of a pro..

  What are common mistakes people make in preparing resumes

What are the most common mistakes people make in preparing their résumés? What should you know about your prospective employer before the job interview?

  How would the community counseling model be utilized

How would the community counseling model be utilized to help a couple deal with excessive drinking, anger, and financial problems?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd