Technical report on a network security topic

Assignment Help Computer Network Security
Reference no: EM131265450 , Length: word count:1000

Instructions:

You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecturer in Week 3/4.

You will be required to search relevant educational databases using Proquest, ERIC or others from your library for a minimum of two recent (>2013) refereed academic papers on your topic. Based on your research you will use relevant literature and published papers to write a technical report (minimum two pages for the body or "core text of the report) on your topic. The report should be to your tutor. You will need to give an overview on the papers themselves (reliability, choice of methodology etc. - a literature review) to set the context of the topic and then report on your conclusions.

You are required to:

- Undertake a literature review of a topic - refer to the following

- https://www.adelaide.edu.au/writingcentre/leaming_guides/leamingGuide writingLiteratureReview.pdf

- https://www.monash.edu.au/Ils/lIonline/writing/general/lit-reviews/index.xml

- https://www.monash.edu.au/Ils/lIonline/writing/science/lit-review/index.xml

- Deliver a presentation - approximately 15 minutes with a 5 minute question time

- Submit your presentation materials (slides, handouts and any other material used).

- Submit a two page report in a technical report format (in pdf format, NOT zipped using your own words), with valid references

- Two pages is the 'text body" of the report - -1000 words ... there will of course be a number of other pages - see the report format below.

- One sentence contains an average of eleven words and one A4 sheet contains an average of between 32 to 35 sentences. Therefore an A4 sheet has an average of 350 to 400 words. However, this does apply to a relatively full A4 sheet with a standard layout and one that is filled with text to around 80-90% of its capacity.

- Your report must demonstrate in-depth academic research by including appropriate references from the Networking related Journals.

- Refer to https://www.monash.edu.au/Ils/lIonline/writing/engineering/technical-report/index.xml for a good format for technical reports.

- Referencing must be in WA format both for in-text and end-text references.

- The report must be submitted via eCampus

- The report must be handed in by the due date or a penalty will be applied (-5% per day late, marked as 0% after 5 days - see section on "Extensions for Submission Dates")

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - that is, it does not cover a network security topic, is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - tha does not cover a network security tonic. is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

Reference no: EM131265450

Questions Cloud

Terminology from the background materials : In preparation for the SLP, make sure you have a thorough grasp of the terminology from the background materials including the main individual and organizational factors that lead to political behavior and the types of political behavior. Once you..
Process of procuring the drug : In hospitals, errors are common during all steps of the medication-use process and the process of procuring the drug, prescribing, dispensing, administering, and monitoring the patient's response.
How public policies and other less formal responses working : What is the problem? Be sure to narrow your problem enough to allow a focused examination. What are the individual and social implications of this problem? Discussion of implications should be supported by accurate research data. What do the expert..
Locate four empirical studies that research change : Locate four empirical studies that research change. Give the APA-formatted citation and add the studies to your RefWorks list. What are the primary methodologies used in the four studies that you read?
Technical report on a network security topic : You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecture..
Discuss a job interview : Discuss a job interview you had at some point. Do you believe the interviewer asked appropriate questions based on the recommendations you have learned in this course?
Explain the information the cio requested in the scenario : Develop a 5- to 7-slide Microsoft PowerPoint slide presentation that includes the information the CIO requested in the scenario.
Select four graphics from newspapers or magazines : Select four graphics from newspapers or magazines. - Critique each graphic based on what you have learned. - What is correctly shown?
Define the various methodologies for sociological research : Define the basic concepts used in the discipline of sociology. Define the various methodologies for sociological research. Use technology and information resources to research issues in sociology.

Reviews

len1265450

11/4/2016 3:18:39 AM

Marking criteria for presentationOn Topic content/explanation 20 On time 10 Use of up-to-date relevant examples 20 Presentation techniques 5 Presentation (PPT) format 5 Conclusion 5 References (choice of/quality) 15 In-depth knowledge of topic 10 Report / resources used 10 Total Marks 100 Note: the resentation will receive zero marks if it does not address the aim of bein. a iresentation of our literature review

len1265450

11/4/2016 3:18:22 AM

• Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment — tha does not cover a network security tonic. is not a literature review or has very poor referencing. • The report will be marked at zero percent if it is not a literature review.

Write a Review

Computer Network Security Questions & Answers

  Network design and analysis

You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations. What routing protocol(s) would you recommend for thi..

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Defines five it security positions

Create a 1-page outline to be included with your audit that defines five IT security positions that will add significant expertise and experience to your security audit.

  Identify at least four functions of the cio using the ebk

Identify at least four functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization.

  Discuss pci dss control objectives and requirements

Discuss PCI DSS control objectives and requirements. Discuss PCI DSS compliance requirements.

  Discuss to implement the network security.

List and discuss two (2) user authentication policies that you can implement to help improve the network's security.

  Why is cryptology important in information security

Why is cryptology important in information security. What would be the implications of not using cryptographic technologies. Why might vendors propose proprietary encryption methods. Why is this suspect

  What is the rationale or justification offered by hackers

What is the rationale or justification offered by hackers such as Anonymous or Wikileaks? How can the activities of such groups be considered "cybercrime"?

  Discuss a situation where you received security education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?

  Discussed the physical design step, who is involved

Why should the organization be careful when deciding who as read only access vs. read and update access to data?

  Program to strip all occurrences

Write a program to strip all occurrences of these characters: '(', ')' and '-'. Also, strip all the leading and trailing whitespace characters. Display the stripped phone number

  Build a computer using a list of unique specifications

Build a computer using a list of unique specifications and troubleshoot any problems that may come up during the building process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd