Future of internet anonymity services

Assignment Help Computer Network Security
Reference no: EM13185777

You are required to conduct research and participate in online/forum discussions on a topic from the set (total of seven topics). In your discussion postings, you should try and address the following points:

  • Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)
  • Raise questions about the information provided by other students (this must be done in an adequately professional manner)
  • Respond to questions raised about your own information and other student's
  • Contribute to discussions in general

Note that the aim of this task is:

  • To build an understanding and perspective of current hot topics in Network Security; and
  • To build generic skills including, but not limited to
    • A capacity for teamwork and collaboration
    • An ability for critical thinking, analysis and problem solving
    • Gaining or improvinginformation technological literacy
    • A capacity for lifelong learning and an appreciation of its necessity

As such, the more you contribute the development of these topics and related discussion the more likely you will score well in this task.

Topic Set

1. The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)

2. The future of internet anonymity services, given the recent revelations of NSA hacking on a global scale

3. Encrypting more and more internet services with SSL (HTTPS) by default

4. The security risks around BYOD (Bring Your Own Device) in the workplace

5. The security risks around using Cloud Computing

6. The security risks to critical infrastructure (such as power, communication, water) from malicious cyber attacks

7. Offering financial rewards for finding security vulnerabilities in software

Your submission

You are required to prepare and submit a report on your topic to address the following questions:

1. Summarize the topic and the issues discussed. Discuss how your own posts contributed to this knowledge.

2. Based on your own research, discuss whether or not the summary presented in (1) is accurate.

3. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Explain why you view this issue/these issues as important.

4. Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Reference no: EM13185777

Questions Cloud

Security infrastructure and protocols : Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.
Explain suitable procedure for purifying : Suggest reasons why recrystallization from water would probably not be suitable procedure for purifying
What is the percentage error : Use differentials to estimate the error in computing the length of the hypotenuse. (Round your answer to two decimal places.)
Negative effects to choson society : Discuss whether the introduction of Western Learning brought positive or negative effects to Choson society.
Future of internet anonymity services : Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.
Did you have any difficulty with this activity : Did you have any difficulty with this activity? Explain why or why not.
Explain what is the final temperature of methane : The normal boiling point of methane is -161.5 C. The specific heats of liquid and gaseous methane are 3.48 and 2.22 J/g.K, respectively. What is the final temperature of methane once the system equilibriates?
Calculate the ratio of steady-state levels income per capita : Suppose that there are two countries, X and Y, that differ in both their rates of investment and their population growth rates. In country X, investment is 20% of GDP, and the population grows at 0% per year. In country Y, investment is 5% of GDP,..
Define the most important problem in baltimore city : Define the most important problem in Baltimore City, Plan a program intervention for the problem chosen. Evaluate the plan and explain what kind of study design was used.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  Find at least four sites that offer malware listings

Search a number of antivirus companies websites and find at least four sites that offer malware listings and compare their latest malware lists

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication. When Bob receives a ticket from Alice, how does he know it is genuine?

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Write application-layer protocols use to move message

Explain how message gets from Alice's host to Bob's host. Make sure to list series of application-layer protocols which are used to move message between the two hosts.

  Describing security topology covers four primary areas

Security topology covers four primary areas of concern (design goals, security zones, technologies, and business requirements). Describe each area including key topics in each area. Discuss software threats.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd