Security threats to mobile devices and countermeasures

Assignment Help Management Information Sys
Reference no: EM131053888 , Length: word count:2000

Task

Below are listed a list of topics. You are required to -

• Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions... etc.)

• Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly.

• Raise questions about the information provided by other students (this must be done in an adequately professional manner)

• Respond to questions raised about your own information and other student's

• Contribute to discussions in general

Note that the aim of this task is:

1. to build an understanding and perspective of current hot topics in Information Security; and

2. to build generic skills including, but not limited to:

• a capacity for teamwork and collaboration;
• an ability for critical thinking, analysis and problem solving;
• information technological literacy;
• a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.

Topics Set

1. US cryptography export restrictions: past, present, and future.
2. Biometrics for authentication: security and privacy implications.
3. Denial of service and distributed denial of service attacks.
4. Malware: past, present and future.
5. Employee privacy and email, WWW, and instant messaging.
6. Security threats to mobile devices and countermeasures.
7. Security threats in cloud computing and preventive methods.
8. Security threats in smart devices.
9. Data Exfiltration.
10. Wireless Network security and preventive methods.
11. Security issues in Software Defined Networks (SDN)
12. Security and privacy issues in Internet of Things (IoT)

Your submission :

You are required to prepare and submit a report on your topic to address the following questions (the length of the report within 1500~2000 words, excluding references):

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.

c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.

d. Discuss the impact of the above mentioned issues and their application/impact in real life.

e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.

f. Provide references (at least three) using APA referencing system including in text citations.

Reference no: EM131053888

Questions Cloud

How the hash functions change as the records are inserted : Assume that blocks are split whenever an overflow occurs, and show the value of n at each stage.
What is your acceleration going down the hill : What is your acceleration bottoming out at the bottom of the hill? Calculate your final velocity after going going down the hill (before experiencing the second acceleration that was calculated).
How many times would we have to perform a fetch : That is, the reorganization cost and subsequent search cost are less than the search cost before reorganization. Support your answer. Assume s = 16 ms, rd = 8.3 ms, and btt = 1 ms.
Monthly linear production possibility frontier : France and Poland each have one worker whose monthly linear Production Possibility Frontier indicates the following production possibilities:
Security threats to mobile devices and countermeasures : Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog
Opportunity cost of producing a capital good : 1. What is the opportunity cost of producing a capital good such a new road? 2. In economic terminology, what is the meaning of investment?
What is the effect of tylers proposed change on income : Who are the stakeholders in this situation and is the proposed change in asset life unethical, or is it simply a good business practice by an astute president?
Determine the type of information needed in the file header : Write program code to access individual fields of records under each of the following circumstances. For each case, state the assumptions you make concerning pointers, separator characters, and so on.
Explain elasticity of demand : Explain elasticity of demand. Please present a simple example of this property.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Important information about information systemdetails the

important information about information systemdetails the owner was impressed with your presentation last week and are

  Analyze the weaknesses of existing e-learning systems

search any topic from internet to stimulate your idea and creativity. You might identify the main problems that the user faced in their daily life or analyze the weaknesses of existing E-learning systems

  Example of a bad decision that had a good outcome

Give an example of a good decision that you made that resulted in a bad outcome. Also give an example of a bad decision that had a good outcome. Why was each decision good or bad

  Define culture and the major elements in a culture

Define culture and the major elements in a culture. Explain your understanding of culture in a global enterprise and explain your position on whether or not culture is a critical factor in managing IT in a global enterprise

  Data analysis and hypothesis testing

Data Analysis and Hypothesis Testing

  How information is used and how it flows in an organization

Write a 700 word paper identifying and describing how information is used and how it flows in an organization

  Describe the decision-making and problem-solving processes

Describe the decision-making and problem-solving processes and Provide at least two examples of the types of decisions that are made by DSS

  Features of both the apple ipad and the samsung galaxy tab

Compare and contrast the features of both the Apple iPad and the Samsung Galaxy Tab

  Identifies the purpose of the project

Draft a 1-2 page (350 words per page) executive summary that states that identifies the areas of the business to be improved, identifies the purpose of the project, and lists stakeholders associated with the project

  Describe threats that specifically target confidentiality

Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.7. What are the components of two-factor authentication ? Provide exa..

  How do companies use an rfp when sourcing software

What is included in a request for proposal (RFP)? How do companies use an RFP when sourcing software

  The purpose of the discussion board is to allow students to

the purpose of the discussion board is to allow students to learn through sharing ideas and experiences as they relate

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd