Research report on big data security

Assignment Help Computer Network Security
Reference no: EM132751149 , Length: word count:800

Assignment

Provide an answer to each of the following questions. Refer to the marking guide when preparing your response to see what criteria and standards will be used to assess your work and your progress towards the related learning outcomes.

Task 1 answer to the question , 400 words limit APA 6 referencing minimum 4 references

1. The information relating to our daily life that flows through a browser to the WWW could include classified/sensitive data. Protecting classified data from malicious data exfiltration is important. SSL (secure socket layer) is one of the leading protocols serving this purpose.

Your task is to - first, describe the basic concept of SSL. Then you need to demonstrate how SSL provides confidentiality and authentication. Your answer should be based on current literature with proper APA 6th referencing.

APA 6 referencing
Answer to the question 400 words limit APA 6 referencing minimum 3 references

2. Design an authentication framework that utilises Kerberos based on a real-life scenario. In your design, make sure to address potential attacks and how Kerberos can protect the system against them. Using a diagram with a suitable use-case to support your claims is essential.
Your answers above should be supported by authoritative sources, properly cited using APA 6th referencing.

Task 2: A preminary draft report on Big Data Security 800 words 4 references apa 6
• In this task need to write a preliminary research report on Big Data Security an emerging area in information security, then discuss it with your peers, and later use their feedback to improve your final report.
1. Use at least three reputable journal and/or conference papers and support your findings with your own personal and/or workplace experience, if applicable.
Marking criteria
• be able to identify and explain the various digital threats to IT networks and computing devices.
• be able to analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how they are used to improve network security.
• be able to compare and contrast the features of various authentication protocols.
• be able to design security solutions using existing authentication protocols.
• be able to effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture.
This assessment item provides you with the opportunity to:
• Demonstrate factual knowledge, understanding and application of state-of-art information security
• Integrate and apply information from various topics.
• Apply understanding and knowledge to a practical situation.
• Collaborate and share knowledge in a teamwork environment.
This assessment item also aims to:
• Build an understanding and perspective of current hot topics in network security.
• Improve your critical thinking, analysis and problem solving, and IT literacy.
• Develop your teamwork collaboration skills.
• Enhance your capacity for lifelong learning and an appreciation of its necessity.

Must follow and meet the following guidelines
SSL
(Task 1.1: 15 Defines SSL with examples and demonstrates its ability to provide confidentiality and authentication. The answers are logically structured to create a cohesive and coherent piece of in-depth analysis. Fluent writing style appropriate to assignment with proper in-text citation and references.
Authentication framework design
(Task 1.2
Comprehensive design that utilises all aspects of the authentication protocol in a realistic scenario and identifies all potential attacks and protection measures.
Research report draft
The report shows high ability to survey, summarise, integrate and link information into a cohesive and coherent article using accurate scientific terminology.

Attachment:- IT networks and computing devices.rar

Reference no: EM132751149

Questions Cloud

What accounts would be debited and credited : What accounts would be debited and credited to record the adjustment for the inventory shrinkage at the end of the accounting period
What is the february contribution margin for steele ltd : ?There were no beginning inventories for January 2011, What is the February contribution margin for Steele Ltd. using the variable costing method?
Journalize sayers entries to record the sale : The cost of the goods sold was $58,000. Journalize Sayers' entries to record (a) the sale. (b) the receipt of payment within the discount period
Calculate the price of a three-month european put option : Calculate the price of a three-month European put option on a non-dividend-paying stock with a strike price of $66 when the current stock price is $66
Research report on big data security : In this task need to write a preliminary research report on Big Data Security an emerging area in information security, then discuss it with your peers
Journalize the entries made by seller to record the return : After the amount due on a sale of $28,000, terms 2/10, n/eom, is received from a customer within the discount period, Journalize the entries made by seller
What kind of bond should buy : What kind of bond should she buy? Max is willing to take on a little risk when she buys a bond, but she wants to be compensated
Journalize the entry to record the receipt of the amount : The invoice amount of the returned merchandise was $4,000. Journalize the entry to record the receipt of the amount due by Beasley Co. on January 7, 20Y4
Which of the bonds is selling at a premium : Which of the bonds is selling at a premium? A: Coupon rate = 3.5%, YTM = 4%. B: Coupon rate = 3.2%, YTM = 3.2%. C: Coupon rate = 2.8%, YTM = 3.5%

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd