Option 1 you can are required to research into one of the

Assignment Help Computer Networking
Reference no: EM13380360

Option 1:

You can are required to research into one of the following topics on data security or computer-network security and to write a report. The report should be of 1500 - 2000 words.

Topics to select from are:
- Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
- Multi-factor authentication and its applications
- Security in digital content distributing systems
- Digital copyright protection
- Privacy protection in electronic commerce
- Privacy and security issues in eHealth

- Access control and data integrity for hospital databases
- Protection of network-based systems against distributed denial-of-service attacks
- IPsec implementation issues in wireless networks
- Secure wireless routing
- Challenges and solutions for security in mobile ad-hoc networks
- Security in peer-to-peer networks
- Security in on-line network games
- IPv6 security issues

- Digital watermarking and fingerprinting

The report should provide an in-depth analysis of the topic based on your research. It is expected that: (1) The security theories, principles, and techniques covered by the subject are applied to your analysis; and (2) The report should include your research findings.

Please note that every student is welcome to choose this option. If you have completed a research report for your first assignment, you may select a new topic to do or continue your topic for the first assignment.

For those who choose to do research and to write reports for both assignments 1 and 2, please make sure that the two research reports are different in the following aspects.

(1) The second research report should include applications of the security theories, principles, and techniques of the subject.

(2) The second report should include your research findings (such as, improved security techniques, improved protocols, or new security techniques proposed by yourself).

(3) The two reports should not have 20% or more overlap (if you choose the same topic as the first assignment).

Option 2:

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:

(a). The simulator will have at least two servers: database server and web server.

(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.

(c). The office in Singapore cannot access the database.

(d). The office in Hong Kong cannot access the web services.

(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e).

Reference no: EM13380360

Questions Cloud

Primary task responsenbspwithin the discussion board area : primary task responsenbspwithin the discussion board area write 400-600 words that respond to the following questions
As the lead software engineer for a medium-sized hospital : as the lead software engineer for a medium-sized hospital you have been asked to spearhead an effort to improve the
1 write an application class that contains several : 1 write an application class that contains several methods.nbspthe first method should be named greeting and should
1 the appropriate sql statements for each query which : 1. the appropriate sql statements for each query which should be copied from your sql code in mysql and pasted into
Option 1 you can are required to research into one of the : option 1 you can are required to research into one of the following topics on data security or computer-network
You will need to design an interface to a systemyou will : you will need to design an interface to a system.you will need to justify every item that you choose to put into this
Assessment taskyour task is to develop a java application : assessment taskyour task is to develop a java application that allows the user to read travel booking data from a text
What does the abstract keyword dowhat are generics as they : what does the abstract keyword do?what are generics as they relate to the built in linked list class? why do we need
One of your smaller customers needs your help writing a : one of your smaller customers needs your help writing a program. your customer has an e-commerce web site but wants to

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd