Explain the major methodologies for secure network

Assignment Help Computer Networking
Reference no: EM132004074 , Length: word count:2000

Security Challenges in Emerging Networks - Overview of Network Security

Purpose of the assessment:

The purpose of this assignment is to develop research and analytical skills. In this assignment students will first learn how to develop knowledge on current state of the art of an emerging knowledge domain. Students will then critically analyse three current or future security issues in this area and its countermeasures. Students should be able to demonstrate their achievements in the following unit learning outcomes:

c. Explain the major methodologies for secure networks and what threats they address;

d. Identify and report network threats, select and implement appropriate countermeasures for network security;

Submission Guidelines

- All work must be submitted on Moodle by the due date along with a title Page.
- The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.
- Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Assignment Description

The purpose of this assignment is to develop research and analytical skills. In this assignment students will firstly learn how to develop knowledge based on the current state of the art emerging knowledge domains. They will critically analyse three of the current or future security issues in this area and their countermeasures.

Internet of Things (IoT) is a network of ‘‘things''. The term ‘‘thing'' here can constitute any smart device ranging from home appliances, telecommunication, sensor devices used in vehicles/ agricultural sector/homeland security to health monitoring devices inside of (or connected with) a human body. In fact, any device that has the ability to collect and transfer data across the network can be a part of an IoT system. With the introduction of smart cities, smart homes, smart office and smart devices, the Internet of Things (IoT) is an emerging area of incredible potential of growth. However, most of these IoT devices are at risk of being hacked and compromised. Internet of Things (IoT) still have many security issues that need to be solved (i.e, RFID tag security, cyber security, wireless security, network transmission security and privacy protection etc). In this assignment student will work on the security issues and its countermeasures in the area of IoT.

This assignment includes three parts.

1. Literature review of Internet of Things (IoT):

Your review should be supported by at least three (3) academic (journal/conference) papers chosen from the current state of the art. The paper should not be older than four years.

Your discussion should include:

i. Introduction to IoT
ii. Characteristics of IoT compared to the traditional network (please include the variety of devices that are used in IoT).
iii. Discuss three areas of applications for IoT.
2. Analyse critically, three current or future security issues in IoT and its countermeasures In this section you will
i. Explain and analyse critically three security issues in IoT.
ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues mentioned in section i.

This section must be supported by at least three (3) references (good quality conference or journal paper such as IEEE/ACM/Springer).

3. Create a 3 - 5 minutes presentation and present your work during the Laboratory class.

You have to create a 3 - 5 minutes presentation to present your work in front of your class members and tutor during the Laboratory class in Weeks 11 and 12.

Reference no: EM132004074

Questions Cloud

Identify an environmental issue facing your community : Identify an environmental issue facing your community. Imagine that you have been asked to educate the members of your community on this environmental issue.
Dsm-5 views sexual addiction : How does society's view of sexual addiction differ from how the DSM-5 views sexual addiction?
Explain how the scientific method is used to solve problems : This assignment addresses course outcomes 1-4: recognize and explain how the scientific method is used to solve problems.
Rationale for the change from pathological gambling : What is the rationale for the change from "pathological gambling" in the DSM-IV to "gambling disorder" in DSM-5?
Explain the major methodologies for secure network : MN502 - Security Challenges in Emerging Networks - Overview of Network Security - Explain the major methodologies for secure networks and what threats
Broca or wernicke area affect speech : From speech patterns, how can you differentiate between which area was affected? How can this affect quality of life?
Prepare a statement of cash flows using the indirect method : During the year equipment was sold for $9,700 cash. Depreciation expense is 13,300. Prepare a statement of cash flows using the indirect method
What is the relationship between learning and memory : What is the relationship between learning and memory? Is it possible to learn without remembering? Why or why not?
Explanation of dichotomy between micro and macro practice : Micro vs. Macro Practice Post by Day 4 an explanation of the dichotomy between micro and macro practice. Describe how micro practice has come to dominate.

Reviews

len2004074

6/1/2018 5:10:24 AM

Presentation slides /4 Very well organised and resourceful Well organised and resourceful Resourceful but could be better organised Resourceful slides but needs improvement Neither resourceful nor well organised Oral Presentation /5 Very good delivery, easy to follow and good interaction. Well Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered but there is room for improvement. No oral presentation or poorly presented.

len2004074

6/1/2018 5:10:18 AM

Report Layout /2 Very well designed layout in IEEE Conference style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout is well designed but not in IEEE Conference style Report lacks a proper layout Reference style /4 Clear styles with excellent source of references. Very Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2004074

6/1/2018 5:10:13 AM

Security Threats /9 Exceptional discussion on security threats for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security threat for the system. Discussion on three security threats Discussion on two security threats Unable to clearly explain security threat Threat Mitigation Techniques and tools /9 Advanced discussion on threats mitigation using latest tools, technologies and procedures Good discussion on threats mitigation using tools, technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation but it needs to be improved. Lacking discussion on threats and mitigation

len2004074

6/1/2018 5:10:07 AM

Literature Review /12 Excellent literature review with proper referencing. Well written literature review presented with correct references. Good literature review presented with references. Literature review is done with proper referencing but there is room for improvement. Poorly written literature review.

len2004074

6/1/2018 5:10:02 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 Introduction should very clearly mention what this report covers and any background information that is needed for the marker to grade this report. The writing should be crisp and clear. Well written introduction covering all the components in the marking criteria very clearly. Good introduction of the report covering all the components in the marking criteria. Introduction covers most of the components in the marking criteria. Introduction is poorly written and does not cover most/all of the components in the marking criteria.

len2004074

6/1/2018 5:09:55 AM

Report Layout The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above). 2 Reference style Follow IEEE reference style. 4 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation (which includes quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 5 Total 50

len2004074

6/1/2018 5:09:48 AM

Section to be included in the report Description of the section Marks Introduction Introduction of IoT. Introduction should also contain what this report covers and any background information that is needed for marker to understand the report. 5 Literature Review Literature review of IoT. 12 Security Threats Analyse critically, three security threats of IoT. 9 Threat Mitigation Techniques and tools Discuss the threat mitigation techniques and tools used for each one of the security vulnerabilities mentioned in the report. 9

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd