Reference no: EM132751659
Assignment
Provide an answer to each of the following questions. Refer to the marking guide when preparing your response to see what criteria and standards will be used to assess your work and your progress towards the related learning outcomes.
Task 1 answer to the question , 400 words limit APA 6 referencing minimum 4 references
1. The information relating to our daily life that flows through a browser to the WWW could include classified/sensitive data. Protecting classified data from malicious data exfiltration is important. SSL (secure socket layer) is one of the leading protocols serving this purpose.
Your task is to - first, describe the basic concept of SSL. Then you need to demonstrate how SSL provides confidentiality and authentication. Your answer should be based on current literature with proper APA 6th referencing.
APA 6 referencing
Answer to the question 400 words limit APA 6 referencing minimum 3 references
2. Design an authentication framework that utilises Kerberos based on a real-life scenario. In your design, make sure to address potential attacks and how Kerberos can protect the system against them. Using a diagram with a suitable use-case to support your claims is essential.
Your answers above should be supported by authoritative sources, properly cited using APA 6th referencing.
Task 2: A preminary draft report on Big Data Security 800 words 4 references apa 6
• In this task need to write a preliminary research report on Big Data Security
an emerging area in information security, then discuss it with your peers, and later use their feedback to improve your final report.
1. Use at least three reputable journal and/or conference papers and support your findings with your own personal and/or workplace experience, if applicable.
Marking criteria
• be able to identify and explain the various digital threats to IT networks and computing devices.
• be able to analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how they are used to improve network security.
• be able to compare and contrast the features of various authentication protocols.
• be able to design security solutions using existing authentication protocols.
• be able to effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture.
This assessment item provides you with the opportunity to:
• Demonstrate factual knowledge, understanding and application of state-of-art information security
• Integrate and apply information from various topics.
• Apply understanding and knowledge to a practical situation.
• Collaborate and share knowledge in a teamwork environment.
This assessment item also aims to:
• Build an understanding and perspective of current hot topics in network security.
• Improve your critical thinking, analysis and problem solving, and IT literacy.
• Develop your teamwork collaboration skills.
• Enhance your capacity for lifelong learning and an appreciation of its necessity.
What are the layers and sections of the stomach
: Use the following words to draw and label a diagram: Oral cavity, Tongue, Pharynx, Oesophagus, Liver, Gall bladder, stomach, small and large intestine, rectum
|
Prepare a budgeted income statement for executive solutions
: Executive Solutions is a strategy consulting firm. Prepare a budgeted income statement for Executive Solutions for May and June (separately).
|
Discuss the role of ontology in web development
: Critical review of the Journal Article: "Ontologies describing concepts and relations in a specific domain are necessary for knowledge representation.
|
Changes in the work schedule
: The labor agreement stipulates that " changes in the work schedule"
|
Design an authentication framework
: Design an authentication framework that utilises Kerberos based on a real-life scenario. In your design, make sure to address potential attacks and how Kerberos
|
Differences between genotype and phenotype
: 1. What is the relationship between an allele, a gene and a chromosome? Explain your answer.
|
Which of statements is correct with respect to the options
: The exercise price is $4.00 and Solar's share price at the time of the grant was $3.00. Which of statements is correct with respect to the options
|
Accessory organs of digestion
: List all the accessory organs of digestion and describe their functions.
|
Prepare the journal entry to record depreciation expense
: If 8,000 units of product are produced in the financial year ended 30 June 2019. Prepare the journal entry to record depreciation expense
|