Demonstrate ability to integrate and apply information

Assignment Help Computer Engineering
Reference no: EM131980076

Assignment

Task

In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:

• Overview of the technology involved
• Relevant technologies and applications of those technologies
• Highlighting the challenges/problems in your chosen research area
• Identification of any gaps in the literature by:

o discussing areas/issues that you believe have been addressed in the current literature;
o highlighting areas/issues that have not been addressed or adequately addressed; and
o discussing your view(s) on the issue(s) that you see as being critical.

• Summarize the future research directions based on the identified gaps

To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 5 research articles. Students are encouraged to access such research articles from well known and reputed research portals such as IEEE, ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations.

Rationale

This assessment continues links back to assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security. The aim of this task is to help students :

• to demonstrate ability to integrate and apply information from various topics;
• to build an understanding and perspective of current and emerging topics in Information Security;
• to help the students to formulate their research project in a step by step manner; and
• to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security

Additionally, this assessment aligns with the following learning outcomes:

• be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;

• be able to explain the fundamental concepts of cryptographic algorithms;

• be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats;

• be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;

• be able to investigate and justify the use of the access control mechanisms and user authentication processes;

• be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

Attachment:- Information-Security.rar

Reference no: EM131980076

Questions Cloud

Build pieces of proposal outlining deployment of vsphere : You will be building pieces of proposal outlining deployment of vSphere into datacenter comparing and contrasting vSphere versus an all physical infrastructure.
Amount of american assets bought by foreigners : Suppose that Americans buy more foreign assets than the amount of American assets bought by foreigners. Then which of the following is true?
Prepare a power presentation of the four articles : Prepare a power presentation of the 4 articles. Support your presentation with appropriate references. Use APA format throughout.
Measures of economic health than changes to government debt : Is it safe to conclude changes in a nation's equity are better measures of economic health than changes to government debt?
Demonstrate ability to integrate and apply information : Demonstrate ability to integrate and apply information from various topics. Build an understanding of current and emerging topics in Information Security.
Gang activity in south central los? angeles : The? movie, based on gang activity in South Central Los? Angeles, received good reviews.
Responsibility of christians with regards : What is the responsibility of Christians with regards to economic development, leadership within the community, and the mandates of the Gospel?"
Calculate the change in gdp : Calculate the change in GDP and Suppose that exports fall by $150 billion with an MPC of .7. Calculate the change in GDP.
Determining the implications for democracy : What is the expressive theory of voting and what are it's implications for democracy?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd