Technical report on a network security topic

Assignment Help Computer Network Security
Reference no: EM131265450 , Length: word count:1000

Instructions:

You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecturer in Week 3/4.

You will be required to search relevant educational databases using Proquest, ERIC or others from your library for a minimum of two recent (>2013) refereed academic papers on your topic. Based on your research you will use relevant literature and published papers to write a technical report (minimum two pages for the body or "core text of the report) on your topic. The report should be to your tutor. You will need to give an overview on the papers themselves (reliability, choice of methodology etc. - a literature review) to set the context of the topic and then report on your conclusions.

You are required to:

- Undertake a literature review of a topic - refer to the following

- https://www.adelaide.edu.au/writingcentre/leaming_guides/leamingGuide writingLiteratureReview.pdf

- https://www.monash.edu.au/Ils/lIonline/writing/general/lit-reviews/index.xml

- https://www.monash.edu.au/Ils/lIonline/writing/science/lit-review/index.xml

- Deliver a presentation - approximately 15 minutes with a 5 minute question time

- Submit your presentation materials (slides, handouts and any other material used).

- Submit a two page report in a technical report format (in pdf format, NOT zipped using your own words), with valid references

- Two pages is the 'text body" of the report - -1000 words ... there will of course be a number of other pages - see the report format below.

- One sentence contains an average of eleven words and one A4 sheet contains an average of between 32 to 35 sentences. Therefore an A4 sheet has an average of 350 to 400 words. However, this does apply to a relatively full A4 sheet with a standard layout and one that is filled with text to around 80-90% of its capacity.

- Your report must demonstrate in-depth academic research by including appropriate references from the Networking related Journals.

- Refer to https://www.monash.edu.au/Ils/lIonline/writing/engineering/technical-report/index.xml for a good format for technical reports.

- Referencing must be in WA format both for in-text and end-text references.

- The report must be submitted via eCampus

- The report must be handed in by the due date or a penalty will be applied (-5% per day late, marked as 0% after 5 days - see section on "Extensions for Submission Dates")

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - that is, it does not cover a network security topic, is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - tha does not cover a network security tonic. is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

Reference no: EM131265450

Questions Cloud

Terminology from the background materials : In preparation for the SLP, make sure you have a thorough grasp of the terminology from the background materials including the main individual and organizational factors that lead to political behavior and the types of political behavior. Once you..
Process of procuring the drug : In hospitals, errors are common during all steps of the medication-use process and the process of procuring the drug, prescribing, dispensing, administering, and monitoring the patient's response.
How public policies and other less formal responses working : What is the problem? Be sure to narrow your problem enough to allow a focused examination. What are the individual and social implications of this problem? Discussion of implications should be supported by accurate research data. What do the expert..
Locate four empirical studies that research change : Locate four empirical studies that research change. Give the APA-formatted citation and add the studies to your RefWorks list. What are the primary methodologies used in the four studies that you read?
Technical report on a network security topic : You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecture..
Discuss a job interview : Discuss a job interview you had at some point. Do you believe the interviewer asked appropriate questions based on the recommendations you have learned in this course?
Explain the information the cio requested in the scenario : Develop a 5- to 7-slide Microsoft PowerPoint slide presentation that includes the information the CIO requested in the scenario.
Select four graphics from newspapers or magazines : Select four graphics from newspapers or magazines. - Critique each graphic based on what you have learned. - What is correctly shown?
Define the various methodologies for sociological research : Define the basic concepts used in the discipline of sociology. Define the various methodologies for sociological research. Use technology and information resources to research issues in sociology.

Reviews

len1265450

11/4/2016 3:18:39 AM

Marking criteria for presentationOn Topic content/explanation 20 On time 10 Use of up-to-date relevant examples 20 Presentation techniques 5 Presentation (PPT) format 5 Conclusion 5 References (choice of/quality) 15 In-depth knowledge of topic 10 Report / resources used 10 Total Marks 100 Note: the resentation will receive zero marks if it does not address the aim of bein. a iresentation of our literature review

len1265450

11/4/2016 3:18:22 AM

• Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment — tha does not cover a network security tonic. is not a literature review or has very poor referencing. • The report will be marked at zero percent if it is not a literature review.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd