MN502 Overview of Network Security Assignment Problem

Assignment Help Computer Network Security
Reference no: EM132377869 , Length: word count:2000

MN502 Overview of Network Security Assignment, T3, 2018 - Melbourne Institute of Technology, Australia

Assessment Title - Security Challenges in Emerging Networks

Purpose of the assessment (with ULO) - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

a. Explain the major methodologies for secure networks and what threats they address;

b. Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description -

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue. Cyber-Physical Systems (CPS) are based on the interaction between digital, analog, physical, and human components engineered for function using integrated physics and logic. These systems aim to provide the basis of our critical infrastructure which results in the basis of emerging and future smart services, and improve our quality of life in many areas.

Smart Grid is one of the CPS technologies, which develops and implements measurement science underpinning modernisation of the Nation's electrical power system (electric grid) in order to improve system efficiency, reliability and sustainability, by incorporating distributed intelligence, bi-directional communications and power flows, and additional advancements. For a smart grid network, communications infrastructure/protocols and wireless networking will play an important role in achieving these objectives. As Smart grid adopts new technologies, this emerging field also faces new security threats. Security of Smart Grid networks is a prime concern in today's World. This assignment includes five parts -

1. Literature review on Smart Grid Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:

i. Smart Grid network architecture (System Component and Network Components)

ii. Recent developments in Smart Grid networks

iii. The importance of cyber security in Smart Grid networks

2. Analyse critically, three current or possible future security issues in Smart Grid networks.

In this section you will analyse critically, three security issues in Smart Grid networks. These issues should be taken from the current state of the art. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2.

In this part you need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Analyse and discuss a case study related to recent attack on power systems.

In this section, students will analyse and discuss a recent attack on the networked power system with proper reference.

5. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Attachment:- Network Security Assignment File.rar

Reference no: EM132377869

Questions Cloud

What are impacts that flexible work schedules : What are impacts that flexible work schedules can have on a employee's productivity?
Explain how the researchers implemented the design : With a clear purpose in place, quantitative researchers have a roadmap for crafting their research questions and hypotheses that will further focus the approach
Employees commitment to employers : What impact will flexible work schedules potentially have on employees' commitment to their employers?
What is the monthly mortgage payment for the borrower : Consider a borrower that is approved for a standard 10-year, fully amortizing house mortgage with an original balance of $500,000 and a note rate
MN502 Overview of Network Security Assignment Problem : MN502 Overview of Network Security Assignment Help and Solution, Assessment Help, T3, 2018 - Melbourne Institute of Technology, Australia
Why is it vital to organizational success : What are the three vertical integration of a business and why is it vital to organizational success?
Identify a brand in your cabinet or pantry : Identify a brand in your cabinet or pantry. Do you believe this brand will have a finite lifespan or one that lasts forever? Support your reasoning.
How does disney connect with the target market : What are some of the challenges associated with Disney theme parks? Use examples.
Design strategies to improve products : With whom should you consult about design strategies to improve products/services and why would you consult with these individuals or groups?

Reviews

len2377869

9/27/2019 11:32:59 PM

All work must be submitted on Moodle by the due date along with a title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Submission Guidelines - The assignment should be submitted on the Moodle in two separate files: The report should be submitted as a Word file and The presentation should be submitted as a PPT file. Do not use Wikipedia as a source or a reference. Make sure you properly reference any diagram/graphics used in the assignment.

len2377869

9/27/2019 11:32:53 PM

Marking Rubric - Introduction is very well written and the report outline is also discussed. Excellent literature review with proper referencing. Exceptional discussion on security issues in Smart Grid networks. Identifying highly sophisticated and well referenced vulnerabilities. A very clear and in-depth discussion about threat mitigation technique. Excellent discussion about the case study. Well-designed layout and proper formatting following the submission guidelines and containing all the sections. Clear styles with excellent source of references. Well organised and resourceful. Good delivery, easy to follow and good interaction.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd