Investigate current security issues related to moving sme

Assignment Help Computer Network Security
Reference no: EM133353336

Professional Secure Networks

You have applied for a job as a cloud security engineer. You have just passed the first stage of the interview. The second stage will test your research skills within the field of cloud / network security. Your employer is offering could services to Small Medium Enterprises (SMEs). There are a lot of reasons why customers are benefiting from migrating to the cloud. Your task is to investigate the current security issues related to moving SMEs to the cloud.

It is not expected that your paper will be at the same level of depth as the papers published in research journals. However, your investigation should not be a general overview. Your written discussion should include critical evaluation and recommendations or conclusions from your findings.

As a professional researcher your report should include some or all of the following:
• the latest technologies, techniques or tools;
• relevant statistical data or trends;
• justification in terms of selecting network equipment or technologies;
• installation or configuration issues;
• testing or implementation procedures;
• social or ethical issues;
• standards or legal issues.

Your potential employer is also expecting from candidates the ability to publish research papers and therefore would like you to follow a specific format. You are required to follow the IEEE formatting style for conference proceedings:

A typical structure of a paper will include:

1. Abstract - this should be a briefly representation of your paper, you should also summarise the findings.

2. Introduction - where you introduce the reader to the selected topic, provide brief details of the importance of your research, present the aim/objectives of your paper and describe profiles of forthcoming sections.

3. Main Body - where you develop your arguments, examine and discuss related works, standards and best industry practices. This could be divided into a number of sub- sections.

4. Conclusions - where you will critically discuss your findings.

5. References - you should aim for approx. 15 references. All references should meet IEEE style.
There is neither a minimum nor maximum word limit. You are limited to a maximum of 6 sides of A4 paper (three double-sided pages). The word count will vary depending on how many illustrations you use.

Reference no: EM133353336

Questions Cloud

Component of the plan in emergency management : Discuss why evaluation and documentation of the maintenance of plan is a vital component of the plan in Emergency Management.
Differences between public assistance and social insurance : Describe the differences between "public assistance" and "social insurance," and why one of these is considered more acceptable than the other by some people.
How is its legacy continuing to shape events : What was the "Arab Spring", and how is its legacy continuing to shape events in North Africa and Southwest Asia? Your response should mention the location
Describe the great society or the war on poverty : Describe the "Great Society" or the "War on Poverty" and include one policy or program it created.
Investigate current security issues related to moving sme : COCS71196 Professional Secure Networks, Staffordshire University - should be a briefly representation of your paper, you should also summarise the findings
How are butterflies related to women and freedom : Provide a scenario that explains the difference between transnational feminism and global feminism.
How might a sociological explanation of such disorders : Consider eating disorders such as anorexia or bulimia. How would a sociologist tend to differ from a psychologist when thinking about such disorders?
How could this action benefit american citizens : In what way could the federal government help increase the exportation of domestically produced oil? How could this action benefit American citizens?
Compare the positions of federalists and anti-federalism : Compare the positions of Federalists and Anti-Federalism regarding the power of the national government.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd