Security and privacy issues in cloud computing

Assignment Help Computer Engineering
Reference no: EM131315627

Task

In this assessment you are required to -

- Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, associated challenges & problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions etc.)

- Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own report and make refinements accordingly.

- Raise questions about the information provided by other students (this must be done in an adequately professional manner)

- Respond to questions raised about your own information and that of other students

- Contribute to discussions in general

Note that the aim of this task is:

1. to build an understanding and perspective of current hot topics in Information Security; and

2. to build generic skills including, but not limited to:
- a capacity for teamwork and collaboration;
- an ability for critical thinking, analysis and problem solving;
- information technology literacy;
- a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute to the development of these topics and related discussion the more likely you will score well in this task.

Topics Set

1. Digital signatures for secure e-commerce.

2. Biometrics for authentication: past. present and future.

3. Attacks against browsers and the potential countermeasures.

4. Recent trends in malware.

5. Signature-based intrusion detection systems.

6. Security and privacy issues of VoIP and Skype.

7. Privacy and security issues associated with Big Data.

8. Smart device security.

9. Internet of Things (IOT): Security issues and solutions.

10. Threats to wireless networks and countermeasures.

11. Bring Your Own Device (BYOD) security.

12. Security and privacy issues in cloud computing.

Your submission:

You are required to prepare and submit a report on your topic to address the following issues (Length of the report: 1500words,

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.

b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.

c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.

d. Discuss the impact of the above mentioned issues and their application/impact in the real world.

e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.

f. Provide references (at least three) using APA referencing system including in text citations.

Reference no: EM131315627

Questions Cloud

Preparing for hr transformations : Of the items that Dr. Dave Ulrich mentioned in the you tube video (in the reading assignments for the week) for preparing for HR transformations, select two that you think are most important for the transformation you will recommend in your third ..
Provide two examples of michael porters value chain model : Provide one example of such recognition of value to support your rationale. Provide at least two specific examples of the Michael Porter's Value Chain Model that apply within a health care organization with which you are familiar.
What is realized return on vc funds overall portfolio : Of the remaining investments, three break even, earning a 0 percent return. One investment pays off spectacularly and earns a 650 percent return. What is the realized return on the VC fund's overall portfolio?
Concept of equity in financial compensation : This week's discussion board allows you to explore the concept of Equity in Financial Compensation. The text discusses four types of equity in compensation: 1) external, 2) internal, 3) employee, and 4) team equity.
Security and privacy issues in cloud computing : Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important - Discuss the impact of the above mentioned issues and their application/i..
How does concept of bootstrap finance relate : List and describe the key financial differences between entrepreneurial growth companies and large publicly traded firms?
Derive the strain functions as a function of x y and z : For A = B = C = 0.001, Q = R = 2, α = β = π, x = y = 1/2, t = 0.002, evaluate and plot the strain as a function of the thickness coordinate z
Approach to employee training and development : Defining the strategic approach to employee training and development allows organizations to align training and development to overall organizational success. Organizations may provide minimal training for job-specific skills or they may opt for a..
Provide two specific examples of balanced scorecard model : Provide at least two specific examples of the Balanced Scorecard Model that apply within a health care organization with which you are familiar.

Reviews

Write a Review

Computer Engineering Questions & Answers

  In brief explain the given options for ending a computing

briefly describe the following options for ending a computing session log off option switch user option sleep option

  Create a two-dimensionsl array depending on user choices

design an application that either sums or averages the rows or columns of a two-dimensionsl array depending on user choices. Use following data for the array.

  How to choose easy medium or hard problems

End program with the quit button. After that is working, add option buttons to allow the user to select easy medium or hard problems, i.e., numbers between 0 and 9, 0 and 99 or 0 and 999.

  Create a set of use cases for the a video store system

Create a set of use cases for the following system: A Video Store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf, it must be catalogued and entered into the video database.

  Question 1a i give an example of a urlii list the three

question 1a i give an example of a url.ii list the three main components of a url stating how their boundaries are

  Developing the java program

Create a block utilizing a loop which will calculate the number of items which can be purchased on the basis of price of the item and total amount available to spend.

  List and describe the ways to backup the registry

Describe the Windows kernel, including its two main components and list and describe the ways to backup the registry.

  List the primary key and functional dependencies

List the primary key and functional dependencies in the following table, subject to the specified conditions. Convert this table to an equivalent collection of tables that are in third normal form (3NF).

  Consider architecture a that has the addressing

Consider architecture A that has the addressing modes below for the ADD instruction. Based on the ADD instruction, is this architecture better be encoded as a fixed-length instruction or a variablelength

  Registers and memory address

Suppose that the .data section is mapped to the start at address 0x1800 in memory at run time, Provide the contents of the registers %r1-%r4.

  Write program that generates casual number between 1 and 100

Write program that generates casual number between 1 and 100?

  How to write a program "oneway"

Write down a program "oneway" which implements a one-way communication between a parent process and it's child using a pipe.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd