Evaluate approaches to the management of IT Security

Assignment Help Computer Network Security
Reference no: EM132268371

Advanced Topics in IT Security Research Paper -

Learning Outcomes - This assignment addresses the following learning outcomes:

  • Evaluate approaches to the management of IT Security.
  • Investigate, summarise and review contemporary topics in IT security.
  • Apply ideas from research and current practices to address problems of IT system security.

Assignment Description - This assignment is individual, and consists of two parts

 (i) Write a paper with a total size of 1500 words in the ACM SIG template (excluding references). Please check the Section 5 for more info on the template.

(ii) Record a presentation video about your paper and submit it.

Part I - Research Paper

The paper should contain at least the following sections. Note that you may add sections and subsections to improve the paper and its structure; for example, you may want to organise the literature review in sub-sections.

1. An abstract provides a compact summary of the report, which highlight what you have done, and usually include the major findings and their significance. It is very important that based on the abstract a reader should be able to tell whether your paper will be useful to them. (Ideally 200-300 words).

2. An introduction summarizes your research question and its context/ background (such as trends, statistics, recent developments in the field), the practical relevance of this question, the initial goal of your paper (how you expected to answer your research question), the relevance of the question for practitioners or researchers, how you did answer your question, and how the paper is structured.

3. A critical analysis of existing literature relevant to your research question. Identify any interesting results, insights, how effective are the proposed methods, and their limitations. Where applicable, also review relevant practices from high quality sources. Additionally, consider the extent to which methods proposed in research papers have been tested in industry. Due to the constraint on page number, only consider the most relevant, recent papers in the field.

4. Based on the drawbacks and limitation identified in this field, propose and discuss a possible (future) direction to improve or overcome some of these drawbacks. You may also discuss the mitigations or counter measures collected from research and/or current practices that minimise or avoid issues identified by the literature review.

Note that you do not have to develop a method (since it is out of scope of this assignment), but only provide some interesting thoughts and discussion on a possible direction (i.e., mainly expressing your idea).

5. A conclusion drawing conclusions about what you have achieved, reflecting on your initial goal, and summarize the main findings.

Part II - Presentation

Presentation time: 15 minutes (max).

You have to do the followings (similar concept to a viva that you will do for your project):

1. Prepare a PowerPoint slideshow about your research paper.

2. The slides should be well-structured (Introduction, Literature review, Discussion/Main findings, Conclusion)

3. Keep strictly the 15 minutes.

Attachment:- Assignment File.rar

Reference no: EM132268371

Questions Cloud

Working mothers sometimes face discrimination : Why do you think working mothers sometimes face discrimination when applying for a job?
Rest of americans : What do you believe to be true and/or untrue about this statement?
Describe what the civil society impact was : Describe what the civil society impact was and explain how and why civil society advocacy made global governance more or less democratic.
How social psychology influence human behavior : Compose a reflection paper in which you will consider how social psychology influence human behavior in the real world -
Evaluate approaches to the management of IT Security : CO4510 - Advanced Topics in IT Security Research Paper, University of Central Lancashire, UK. Evaluate approaches to the management of IT Security
To what extent have international factors influenced : "To what extent have international factors influenced the development of Iran? Have these factors overpowered domestic factors? Why or why not?"
Analyze the political and legal challenges the company faces : Analyze the political, economic, cultural and legal challenges the company currently faces in any of the country it operates (select one country in which).
How experiencing cognitive dissonance about debatable issue : Briefly describe how experiencing cognitive dissonance about a debatable issue may make a person more susceptible to social influence, such as conformity
Which financial system was in place when story takes place : Which financial system was in place when the story takes place? How the banker/s or financier/s is represented by the novel/movie? Which was the consideration.

Reviews

len2268371

3/28/2019 2:02:34 AM

Write a paper with a total size of 1500 words in the ACM SIG template (excluding references). Please check the Section 5 for more info on the template. Record a presentation video about your paper and submit it. The distribution of weighting among the components of this assignment is: Research Paper: 80% and Oral presentation for peers: 20%. The detailed marking scheme will be provided in time by the tutors. Each marking criterion is refined into a number of sub-criteria that will be evaluated individually in terms of achievement. All those sub-criteria are composed by formulae resulting in a mark for the criterion. This grading mechanism is used across schools at UCLan.

len2268371

3/28/2019 2:02:28 AM

To be awarded a distinction grade (74, 80, 87, 94, 100) your work will be of a very good standard. The abstract is compact and clear with very few or no spelling/grammar issues. Well-written/good/professional sentences/may contain very few typos and grammatical issues. Used high quality/number of sources/high quality discussion of main findings/results identified/with high quality critical reasoning. Critical discussion: High number of drawbacks or important drawbacks identified\ high quality suggestions\very few or no typos/grammar issues. High number (> 12) and quality (acceptable conferences/journals) of references. Good format (ACM format) and Within the word limit (1500 words + 10%). Your report structure, writing style (professional/compact/focused) and referencing quality/quantity will be used to determine whether you receive a low (74), mid (87) or high (94, 100) distinction grade.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd