Prepare a survey report of a particular security issue

Assignment Help Computer Network Security
Reference no: EM132126283

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some research papers in the 'recommended reading/resources' folder under the Resources for Students section, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well. Please read the following information about a survey. [20 marks]

What is a survey?

The goal of a survey is to give a broad, structured overview of a specific area.

For example, suppose you are working for a company that is exploring a new wireless technology or market, so employees and management are very not very familiar with this new area. You could be asked to prepare a written report and a 30 minute presentation to introduce to area, highlighting different approaches, challenges, opportunities, and risks.

A survey is different from a set of paper summaries. The survey should focus on presenting the "big picture" using the papers as examples. For each topic, we have identified about three papers to get you started, but we generally expect that you will have to consult additional materials. Examples may be papers cited in the original papers, material found on the web, or results from online libraries, like IEEE Explorer, or the ACM portal.

Deliverable: You should submit a written version of your survey. The length should be from 1000 to 2000 words (about 3-5 pages), not including references.

There is no strict template to be followed for this report. However, you may use the following- abstract/executive summary, importance of your security issue, state-of-the art, how the researchers are addressing the issue, which direction the research is going, the probable future research direction, conclusion/your comments, and references.

Reference no: EM132126283

Questions Cloud

What do you think elizabeth means by her disgrace : Identify major indicators of the Jewish cultural context of this material. There's quite a lot, so don't feel you need to be totally comprehensive.
Discuss about mapping cloud security controls : Download the Cloud Security Alliance (CSA) Cloud Controls Matrix spreadsheet. (A quick Internet search should give you the address of the most current version.
What sort of sin does this suggest tax collectors would be : Write a sentence or two for each person, describing how their healing would have opened up new possibilities for them, or otherwise changed their life.
Four types of economics evaluations : What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI
Prepare a survey report of a particular security issue : Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking.
How much will be in the fund immediately after the 30th : If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immediately after the 30th
How is the city trying to reconfigure and reshape : Was the industry/company affected by globalization? How did it change and how did the changes affect the city?
How much will jeff have at month 61 : Assuming his investments earn an interest rate of 5%, how much will Jeff have at month 61?
How much was the second payment : (a) How much was the second payment? (b) What is the equivalent uniform series (if she was going to pay the loan in 5 equal payments)?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd