Reference no: EM13192714
Option 1:
You can are required to research into one of the following topics on data security or computer-network security and to write a report. The report should be of 1500 - 2000 words.
Topics to select from are:
- Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
- Multi-factor authentication and its applications
- Security in digital content distributing systems
- Digital copyright protection
- Privacy protection in electronic commerce
- Privacy and security issues in eHealth
- Access control and data integrity for hospital databases
- Protection of network-based systems against distributed denial-of-service attacks
- IPsec implementation issues in wireless networks
- Secure wireless routing
- Challenges and solutions for security in mobile ad-hoc networks
- Security in peer-to-peer networks
- Security in on-line network games
- IPv6 security issues
- Digital watermarking and fingerprinting
The report should provide an in-depth analysis of the topic based on your research. It is expected that: (1) The security theories, principles, and techniques covered by the subject are applied to your analysis; and (2) The report should include your research findings.
Please note that every student is welcome to choose this option. If you have completed a research report for your first assignment, you may select a new topic to do or continue your topic for the first assignment.
For those who choose to do research and to write reports for both assignments 1 and 2, please make sure that the two research reports are different in the following aspects.
(1) The second research report should include applications of the security theories, principles, and techniques of the subject.
(2) The second report should include your research findings (such as, improved security techniques, improved protocols, or new security techniques proposed by yourself).
(3) The two reports should not have 20% or more overlap (if you choose the same topic as the first assignment).
Option 2:
Based on the following background information and project requirements, complete a project making use of OPNET:
Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.
Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.
For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).
Requirements for the simulator:
(a). The simulator will have at least two servers: database server and web server.
(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.
(c). The office in Singapore cannot access the database.
(d). The office in Hong Kong cannot access the web services.
(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).
(f). The simulator should include the following scenarios for comparison purpose:
- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.
- Scenario 2: Only firewall is implemented.
- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.
- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e).
Define sunlight consists of photons
: At noon on a clear day, sunlight reaches the earth's surface at Madison, Wisconsin, with an average power of approximately 8.00 kJ·s-1·m-2. If the sunlight consists of photons with an average wavelength of 510.0 nm
|
What is the consumer surplus enjoyed by the high demand
: design two packages for the second-degree price discrimination case so that the first package has quantity 8 for the high demand and the second one has quantity 6 for the lower demand such that the low demand group has consumer surplus at least $5..
|
Explain what causes the high interest rates in the market
: A number of companies exist that specialize in "payday loans." Payday loans are small loans often for a few hundred dollars or less that are made to low-income borrowers. Often these borrowers have poor credit histories and few assets and would ha..
|
What is expected market price if bond market is efficient
: a. If the bond market is efficient, what is the market price of the bond expected to be in one year b. Suppose the bond issuer increases the coupon payment during the year to $30, with the same interest rate and the same current market price, what..
|
How the database and web services can be protected
: Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques
|
What happens to the investment with annual inflation
: If I invested 10,000 in a fund paying 0.2% annual fees and added $100.00 per month for 40 years, receiving 10.4% annual returns what happens to the investment with 3.43% annual inflation What is the value in terms of today's dollars
|
How many firms will there be in long run equilibrium
: Suppose there are n identical firms in a market. Each firm has fixed cost equal to 392, and variable cost given by VC = 2q^2, where q is the amount that an individual firm produces. This means that an individual firm's marginal cost is given by MC..
|
Which motor should be installed considering pw
: An electric motor is 10HP. Motor A costs $800, and is 85% efficient. Motor B costs $1200 and is 90% efficient. Both motors will operate 1,500 hours at an energy rate of 0.07 per kilowatt hour. Both motors have a 15 year life span.
|
Application screen design and layout function
: Design focus is on providing the application screen design and layout function for the purchaser. You do not have to worry about the accounting system for the bookshop
|