Perspective of current hot topics in information security

Assignment Help Management Information Sys
Reference no: EM131243819

Task - In this assessment you are required to -

Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, associated challenges & problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions etc.)

Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own report and make refinements accordingly.

Raise questions about the information provided by other students (this must be done in an adequately professional manner)

Respond to questions raised about your own information and that of other students

Contribute to discussions in general

Note that the aim of this task is:

1. To build an understanding and perspective of current hot topics in Information Security; and

2. To build generic skills including, but not limited to:

- a capacity for teamwork and collaboration;

- an ability for critical thinking, analysis and problem solving;

- information technology literacy;

- a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute to the development of these topics and related discussion the more likely you will score well in this task.

Topics Set

1. Digital signatures for secure e-commerce.

2. Biometrics for authentication: past, present and future.

3. Attacks against browsers and the potential countermeasures.

4. Recent trends in malware.

5. Signature-based intrusion detection systems.

6. Security and privacy issues of VoIP and Skype.

7. Privacy and security issues associated with Big Data.

8. Smart device security.

9. Internet of Things (IOT): Security issues and solutions.

10. Threats to wireless networks and countermeasures.

11. Bring Your Own Device (BYOD) security.

12. Security and privacy issues in cloud computing.

You are required to prepare and submit a report on your topic to address the following issues (Length of the report: 1500words,

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.

b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.

c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.

d. Discuss the impact of the above mentioned issues and their application/impact in the real world.

e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.

f. Provide references (at least three) using APA referencing system including in text citations.

Reference no: EM131243819

Questions Cloud

What is the value of the dollar : Suppose the price level and value of the dollar in year 1 are 1 and $1, respectively. If the price level rises to 1.25 in year 2, what is the new value of the dollar? If, instead, the price level falls to .50, what is the value of the dollar? What..
Explain the negative aspects of friendship : Explain the notion of friendship in C++. Explain the negative aspects of friendship.
How is the chairperson of federal reserve system selected : What is meant when economists say that the Federal Reserve Banks are central banks, quasi-public banks, and bankers' banks? What are the seven basic functions of the Federal Reserve System?
Why is music so essential to the cinematic process : Why is music so essential to the cinematic process? What film composers are most important think about John Williams. Maybe consider looking at 3 or 4 film composers, including Williams, as examples and compare and contrast their styles.
Perspective of current hot topics in information security : To build an understanding and perspective of current hot topics in Information Security; and To build generic skills including, but not limited to: a capacity for teamwork and collaboration; an ability for critical thinking, analysis and problem solv..
Impact of diploma mills on legitimate educational : 1) What is the impact of diploma mills on legitimate educational institutions? How does one check the credentials of learning institutions to verify legitimacy? What should one look for when selecting an institution of higher learning?
Develop a brief roadmap for implementation : Discuss how you will implement your strategic plans, including how teams should be implemented in each department. Develop a brief roadmap for implementation. Identify the primary benchmarks to assess success or failure
Discuss the rationale behind taxonomists placing sharks : Discuss the rationale behind taxonomists placing sharks and dolphins in different taxonomic groups, even though they are both aquatic, have very similar body forms, and share other traits as well.
Demonstrate the impact of the fed reduces the reserve ratio : Commercial banks borrow from Federal Reserve Banks after winning an auction held as part of the term auction facility.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd