Summarise and review contemporary topics in IT security

Assignment Help Computer Network Security
Reference no: EM132268590

Advanced Topics in IT Security Research Paper Assignment -

Learning Outcomes - This assignment addresses the following learning outcomes:

  • Evaluate approaches to the management of IT Security.
  • Investigate, summarise and review contemporary topics in IT security.
  • Apply ideas from research and current practices to address problems of IT system security.

Assignment Description - This assignment is individual, and consists of two parts

(i) Write a paper with a total size of 1500 words in the ACM SIG template (excluding references). Please check the Section 5 for more info on the template.

(ii) Record a presentation video about your paper and submit it.

Part I. Research Paper

The paper should contain at least the following sections. Note that you may add sections and subsections to improve the paper and its structure; for example, you may want to organise the literature review in sub-sections.

1. An abstract provides a compact summary of the report, which hightlight what you have done, and usually include the major findings and their significance. It is very important that based on the abstract a reader should be able to tell whether your paper will be useful to them. (ideally 200-300 words)

2. An introduction summarizes your research question and its context/ background (such as trends, statistics, recent developments in the field), the practical relevance of this question, the initial goal of your paper (how you expected to answer your research question), the relevance of the question for practitioners or researchers, how you did answer your question, and how the paper is structured.

3. A critical analysis of existing literature relevant to your research question. Identify any interesting results, insights, how effective are the proposed methods, and their limitations. Where applicable, also review relevant practices from high quality sources. Additionally, consider the extent to which methods proposed in research papers have been tested in industry. Due to the constraint on page number, only consider the most relevant, recent papers in the field.

4. Based on the drawbacks and limitation identified in this field, propose and discuss a possible (future) direction to improve or overcome some of these drawbacks. You may also discuss the mitigations or counter measures collected from research and/or current practices that minimise or avoid issues identified by the literature review.

Note that you do not have to develop a method (since it is out of scope of this assignment), but only provide some interesting thoughts and discussion on a possible direction (i.e., mainly expressing your idea).

5. A conclusion drawing conclusions about what you have achieved, reflecting on your initial goal, and summarize the main findings.

Part II. Presentation

Presentation time: 15 minutes (max).

You have to do the followings (similar concept to a viva that you will do for your project):

1. Prepare a powerpoint slideshow about your research paper.

2. The slides should be well-structured (Introduction, Literature review, Discussion/Main findings, Conclusion)

3. Keep strictly the 15 minutes.

Attachment:- Assignment File.rar

Reference no: EM132268590

Questions Cloud

In what ways does today conservatism look different : As discussed in this module, contemporary conservative thought is highly diverse. What does it mean to 'be conservative' within American politics today?
Definition of social class : All of the following statement are true except: a) There are definite divisions between the social classes as prescribed by law in the United States.
What are the essential elements of burke thought : Relevance and thoroughness: The arguments and statements in your written assignment should be directly related to the assignment topic.
Design an information system using access : Principles of MIS (0506200) - AL AIN UNIVERSITY OF SCIENCE AND TECHNOLOGY - write a case that illustrate the use of Information systems in an organization
Summarise and review contemporary topics in IT security : CO4510 Advanced Topics in IT Security Research Paper Assignment - Investigate, summarise and review contemporary topics in IT security
What is the origin of the concept ghetto : What is the origin of the concept "ghetto?" How is it an American phenomenon?
Discuss how the article illustrates a prisoner dilemma : Discuss how the article illustrates a prisoner's dilemma. Explain the best course of action for the U.S., using the Prisoner's Dilemma paradigm as a guide.
What are some positive and negative effects : What are some positive and negative effects of gentrification on former residents of a gentrifying neighborhood?
Illustrate the different levels of analysis : International relations occur at a variety of levels. Individual diplomats and world leaders communicate with each other daily. Domestically, state governmental

Reviews

len2268590

3/28/2019 3:37:11 AM

This assignment is individual, and consists of two parts - Write a paper with a total size of 1500 words in the ACM SIG template (excluding references). Please check the Section 5 for more info on the template. Record a presentation video about your paper and submit it. To be awarded a merit grade your work will be of a very good standard. The abstract is readable and in appropriate length, it may contain only few spelling/grammar issues. Good sentences/may contain only few typos and grammatical issues/easy readability. Used acceptable quality/number of sources/acceptable quality discussion of main findings/results identified/contain critical reasoning but missing some or contain unnecessary parts. Critical discussion: Sufficient drawbacks identified\ good quality suggestions\few typos or grammar issues. Acceptable/good number (8-12) and quality (acceptable conferences/journals) of references. Good format (ACM format) Within the word limit (1500 words + 10%).

Write a Review

Computer Network Security Questions & Answers

  What is the morality of posting an encryption key

What is the morality of posting an encryption key on a website publicly in order to help others play digital disks.

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Explain the registration and authentication process

Identify encryption technology used both in transit and in storage for one provider. Explain the registration and authentication process for one of providers.

  Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your ..

  How cryptography actually secures data

In this essay, discuss what you have learned on cryptography and how this method to secure information has changed over the decades.

  Compare the information in the given three articles

Compare the information in the three articles and point out specific issues where the authors may disagree or emphasize different points.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  What machines were used and how long did it take

Research an attempt to crack either DES, 3DES, or AES. What machine(s) were used, and how long did it take? Be sure to cite your source of information.

  Discuss a case study on your chosen it system

BN203: Network Security/Overview of Network Security Identify three (3) security vulnerabilities in the chosen case study and discuss how these threats can be mitigated using security policies and security tools.

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  What you have done to protect the network

Prepare a 2-page memo in Word outlining what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against other security concerns including worms, viruses

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd