Discuss the mitigations or counter measures

Assignment Help Theory of Computation
Reference no: EM133047810 , Length: word count:2400

Assignment Description

This assignment is individual, You have to write a paper with a total size of 2400words in the ACM SIG template(excluding references). Please check the Section 5 for more info on the template.

Research Paper Structure

The paper should contain at least the following sections. Note that you may add sections and subsections to improve the paper and its structure; for example, you may want to organise the literature review in sub-sections.

1. An abstract provides a compact summary of the report, whichhightlight what you have done, and usually include the major findings and their significance.It is very important that based on the abstract a reader should be able to tell whether your paper will be useful to them. (ideally 200-300 words)

2. An introduction summarizes your research question and its context/background (such as trends, statistics, recent developments in the field), the practical relevance of this question, the initial goal of your paper (how you expected to answer your research question), the relevance of the question for practitioners or researchers, how you did answer your question, and how the paper is structured.

3. A critical analysis of existing literature relevant to your research question. Identify any interesting results, insights, how effective are the proposed methods, and their limitations. Where applicable, also review relevant practices from high quality sources. Additionally, consider the extent to which methods proposed in research papers have been tested in industry. Due to the constraint on page number, only consider the most relevant, recent papers in the field.

4. Based on the drawbacks and limitation identified in this field, propose and discuss a possible (future) direction to improve or overcome some of these drawbacks. You may also discuss the mitigations or counter measures collected from research and/or current practices that minimise or avoid issues identified by the literature review.

• Note that you do not have to develop a method (since it is out of scope of this assignment), but only provide some interesting thoughts and discussion on a possible direction (i.e., mainly expressing your idea).

5. A conclusiondrawing conclusions about what you have achieved, reflecting on your initial goal, and summarize the main findings.

Research Topic

3.1. Web Security
• Phishing attack
• SQL injection
• Cross site scripting (XSS)
• Cross site request forgery (CSRF)
• Browser security
• Certificate vulnerabilities (e.g., Heartbleed bug)
• Typosquatting

3.2. Coping with Internal Attackers/Threats
• Based on honeynet/honeypot/honeytokens
• Based on trap documents
• Based on intrusion detection system (IDS)

3.3. Authentication Methods
• Multi-factor authentication
• CAPTCHA
• Biometric authentication
• Graphical Passwords
• Shoulder Surfing
• Single Sign On (SSO)

3.4.Security and Privacy of Cloud services
• Client-side/end-to-end encryption vs. server side encrytion scheme
• Privacy and accountability of cloud services
o from the data subjects (user), data controller (service provider), and legal perspective.
• Big data problem in cloud computing and storage
• Data theft in cloud (e.g., Fog computing)
• Automated malware analysis in the cloud
• Health-care management in the cloud

3.8 Security and Privacy inSocialNetworks
• Centralized and decentralized (peer 2 peer) social networks
• Privacy and accountability of social networks
o from the data subjects (user), data controller (service provider), and legal perspective.
• Protecting children in online social networks
• Crowdturfing activities in online social networks and detection
• Sybil (fake) account problem in online social networks and detection

3.10 Firewall, IDS Security
• Firewall/IDS misconfiguration problems
o Inconsistency/Anomaly in firewall and IDS rulesets
• Conformation between high-level firewall/IDS policy and low-level firewall/IDS configuration

TOP CONFERENCES AND JOURNALS IN CYBER SECURITY AND PRIVACY

You may browse the websites of the following top conferences and journal for the most relevant related works. Note that each conference and journal have a different version each year, e.g., CCS 2019, CCS 2020, etc., therefore you can Googlebased on the conference name + year + keywords. Also, keep in mind that these are only recommendation, you are allowed to work with papers from other places.

• ACM Conference on Computer and Communications Security (CCS)
• USENIX Security Symposium (USENIX)
• IEEE Symposium on Security and Privacy
• Network & Distributed System Security Symposium (NDSS)
• European Symposium on Research in Computer Security (ESORICS)
• ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
• ACM Symposium on Information, Computer and Communications Security (ASIACCS)
• Privacy Enhancing Technologies Symposium (PETS)
• Workshop on Privacy in the Electronic Society (WPES)

Reference no: EM133047810

Questions Cloud

What is the value of the fund today : Your brother who is six years old b just received a trust fund that will be worth 24,000 when he turns 21 years old. What is the value of the fund today
Discuss michael porter generic competitive strategies : Discuss each of Michael Porter's generic competitive strategies and what makes each strategy generic. Is strategy an important aspect of managing a company?
How do you define film : 1. How do you define "film", with movies being released on numerous platforms, and often never created using actual rolls of film?
Determine the unrealized gain or loss on the investment : Big Bad Companys stock was trading on the open market for $15.50 per share at the end of the year. Use this information to determine the unrealized gain or loss
Discuss the mitigations or counter measures : Identify any interesting results, insights, how effective are the proposed methods, and their limitations
Discuss different system mobile functionalities : Compare and Contrast mobile applications vs websites. Discuss different system mobile functionalities. Explain the social aspect of mobile interfaces.
What amount will be credited to Ana interest : Payments of accounts payable in the amount of $7,200 was not posted to the payable account. What amount will be credited to Ana's interest
Similarity between discrimination and classification : Explain difference and similarity between discrimination and classification, between characterization and clustering and between classification and regression
What are LaRhonda realized and recognized gain or loss : Question - LaRhonda owns an office building that has an adjusted basis of $41,700. What are LaRhonda realized and recognized gain or loss

Reviews

len3047810

12/15/2021 9:37:25 PM

Note that the ACM SIG template uses numbered references, not Harvard style referencing

Write a Review

Theory of Computation Questions & Answers

  1 we all have a picture of a dream job in our heads some

1. we all have a picture of a dream job in our heads. some of us might even be lucky enough to be working in their

  Formulate the corresponding coffee-machine decision problem

meeting rooms on university campuses may or may not contain coffee machines. we would like to ensure that every meeting

  Prove the problem by contradiction

Let n > 1 be an integer. Prove by contradiction that if n is a perfect square, and then n + 3 cannot be a perfect square.

  Complete an essay discussing ethical theories

BIT203 Professional Practice and Ethics - During week 6 you will be required to give a brief 5-8 minute presentation to the class explaining either the analysis and conclusion of your essay topic or a detailed description of some aspect of the ass..

  Design unambiguous grammar to parse expressions

Write a program would read two numbers and then print all numbers between the first and the second, inclusive. Design unambiguous grammar to parse expressions

  Design a state machine that will control a vending machine

Design a state machine that will control a vending machine. Turn in your module and testbench code as well as a simulation waveform

  Construct a turing machine for all encrypted passowords

Construct a turing machine for all encrypted passowords using zn algorithm

  Construct unambiguous context free grammars

Construct unambiguous context-free grammars for each of the following languages. In each case show that your grammar is correct.

  Find cfgs for the languages

Find CFGs for the languages over the alphabet sigma = {a   b}:

  Check the validity of the given argument using a truth table

Check the validity of the following argument using a truth table. Formulate the following sentences as predicate logic statements.

  Design a task or function that will check the parity of word

Design a task or function that will check the parity of a word for odd parity. The input to the task/function is a 5-bit word called data_in

  Write grammar for language consisting of strings

Write a grammar for the language consisting of strings that have n copies of the letter a followed by same number of copies of the letter b, where n>0

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd