Discuss distributed denial of service attacks

Assignment Help Basic Computer Science
Reference no: EM131483309

Question: TaskBelow are listed a list of topics. You are required to -

Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions... etc.)Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly.Raise questions about the information provided by other students (this must be done in an adequately professional manner)Respond to questions raised about your own information and other student'sContribute to discussions in general

Note that the aim of this task is:

1.to build an understanding and perspective of current hot topics in Information Security; and

2. to build generic skills including, but not limited to:

a capacity for teamwork and collaboration;an ability for critical thinking, analysis and problem solving;information technological literacy;a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.
Topics Set1. US cryptography export restrictions: past, present, and future.2. Biometrics for authentication: security and privacy implications.

3. Denial of service and distributed denial of service attacks.

4. Malware: past, present and future.

5. Employee privacy and email, WWW, and instant messaging.

6. Security threats to mobile devices and countermeasures.

7. Security threats in cloud computing and preventive methods.

8. Security threats in smart devices.

9. Data Exfiltration.

10. Wireless Network security and preventive methods.

11. Security issues in Software Defined Networks (SDN)

12. Security and privacy issues in Internet of Things (IoT)

Your submission :You are required to prepare and submit a report on your topic to address the following questions (the length of the report within 1500~2000 words, excluding references):

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.d. Discuss the impact of the above mentioned issues and their application/impact in real life.e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.f. Provide references (at least three) using APA referencing system including in text citations.

RationaleThis assessment item relates to the learning objectives and to demonstrate your understanding of the material in different topics of your subject.

Its also provides an opportunity for you to :

demonstrate factual knowledge, understanding and application of state-of-art information security;demonstrate ability to integrate and apply information from various topics and ;apply understanding and knowledge to a practical situation;demonstrate ability to work in a team, sharing knowledge.PresentationThe following should be included as requirements in the report structure:

• Executive Summary or Abstractprovide a brief overview, your involvement/contribution, major findings and conclusion

• Table of Content

• IntroductionBackground,scope of engagement,tools used andsummary of findingsImpact in real life etc.

• Conclusion

• ReferencesYou must cite references to all material you have used as sources for the content of your workFollow the referencing guidelines for APA 6 as specified in Referencing Guides.

• Glossary (Preferable)A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.

• Appendices (Preferable)You can attach any supporting material such as printouts of particular items of evidence, feedback from your cohort colleagues etc. .

Submit the assignment in ONE word or pdf file on Turnitin. Please do not submit *.zip or *.rar or multiple files.
RequirementsYour submission must be in a form readable by Microsoft Word format.

• A cover page (outside the page limit) must be included and should contain relevant identifying information.

• Your discussion postings are considered part of your assignment submission and are thus subject to Faculty regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced. You should clearly indicate the start and end of any such text.

• Your discussion postings will be used required to complete your assignment but do not directly form part of the assessment of the assignment. As such, no formal feedback will be provided regarding your discussions.

Reference no: EM131483309

Questions Cloud

What would you focus on in the re-training program : How can you introduce your new policy without creating resentment among the reps? What would you focus on in the “re-training” program?
Hand held tools that are carefully crafted for local markets : A small manufacturing firm believes there is a market for hand held tools that are carefully crafted for local markets.
Find the order quantity that will minimize total annual cost : A jewelry firm buys semiprecious stones to make bracelets and rings. find the order quantity that will minimize total annual cost.
What are critical success factors for project integration : What are the critical success factors for project integration? How do You Best Control Project Integration Activities?
Discuss distributed denial of service attacks : Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief.
Define the steps in the new product development process : define the steps in the new product development process and the major considerations in managing this process successfully.
Develop mathematical model for the total profit realized : Develop a mathematical model for the total profit realized from an order for x pairs of shoes.
Define functional requirements : BackgroundRefer to background information provided in Assessment 1 regarding the Commonwealth Government ‘My Health Record' project.Complete the Following.
How did the author synthesize or organize the information : What type of data was used for the research? How did the author synthesize or organize the information?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How can a network designer determine if they are important

How can a network designer determine if they are important, and how are they taken into account when designing a data communications network?

  What is the general solution to handle such game trees

The min max algorithm cannot handle some games (even-with alpha-beta pruning) because of the depth of the search trees involved. What is the general solution to handle such game trees?

  Calculate performance of cache and the average cpi

Assume the instruction cache miss rate is 0.5% and the data cache miss rate is 1%. Calculate the performance of the cache (CPU execution time) and the average CPI.

  Explain why backing up system states is important

If applicable, adhere to APA guidelines when creating in-text citations and references. Your assignment should be free of grammatical errors, use complete sentences and give specific details that support your statements.

  Write a recursive method that returns the smallest integer

Write a recursive method that returns the smallest integer in an array of integers. If you divide the array into two pieces- halves, for example-and find the smallest integer in each of the two pieces, the smallest integer in the entire array will..

  Contrast among pci-mca and eisa systems

Compare and Contrast among PCI, MCA, and EISA systems

  What benefits do businesses gain by offering wireless

What benefits do businesses gain by offering wireless Internet access?

  Critical need for information security

Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization.

  Human being

Computers can do better than Human being

  Component interface for an emergency control room

Assignment on the Component Interface for an Emergency Control Room

  Use a jframe or japplet as the primary interface

Use a JFrame or JApplet as the primary interface. Extend whatever Swing elements .you need to create the animationUse at least one interface to handle events

  Capture of traps based on thresholds

Your white paper must describe the establishment of a baseline, the capture of traps based on thresholds, the generation of alerts, and a discussion of alert handling. Your paper must be between two to three pages in length in APA format.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd