Threats to wireless networks and countermeasures

Assignment Help Computer Network Security
Reference no: EM131603825 , Length: word count:1600

Research Project

Task

In this assessment you are required to -

- Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) on any major aspect of this chosen topic and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, associated challenges &problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions etc.)

- Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own report and make refinements accordingly.

- Raise questions about the information provided by other students (this must be done in an adequately professional manner)

- Respond to questions raised about your own information and that of other students

- Contribute to discussions in general

Note that the aim of this task is:
1. to build an understanding and perspective of current hot topics in Information Security; and
2. to build generic skills including, but not limited to:
- a capacity for teamwork and collaboration;
- an ability for critical thinking, analysis and problem solving;
- information technology literacy;
- a capacity for lifelong learning and an appreciation of its necessity.
As such, the more you contribute to the development of these topics and related discussion the more likely you will score well in this task.

Topics Set

1. Cyberterrorism

2. Biometrics for authentication: past. present and future

3. Web Browser Attacks

4. Recent trends in malware

5. Anomaly-based intrusion detection systems

6. Quantum cryptography

7. Privacy and security issues associated with Big Data

8. Smart device security

9. Internet of Things (IOT): Security issues and solutions

10. Threats to wireless networks and countermeasures

11. Security and privacy issues associated with social media

12. Security and privacy issues in cloud computing

Your submission:

You are required to prepare and submit a report on your topic to address the following issues ( Lengthof the report: 1500~2000 words, excluding references):

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.

b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.

c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.

d. Discuss the impact of the above mentioned issues and their application/impact in the real world.

e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.

f. Provide references (at least three) using APA referencing system including in text citations.

Length of the report: 1500~2000 words

Reference no: EM131603825

Questions Cloud

What trends do you see in the data sets : What trends do you see in the data sets? What are 2-3 relationships between the economic concern you selected and that specific country's economy?
A criminal risk of dangerousness assessment : Identify and describe assessment tools (psychological tests) for harm towards others and assessment tools (psychological tests) for harm towards self.
Discuss behavior problems that organizations face : What kinds of problems would an ABA professional who specializes in organizational behavior deal with. How can the principles of behavior
How you could have predicted the derivative by using algebra : Use a computer algebra system to find and simplify the derivative of the given function.
Threats to wireless networks and countermeasures : ITC595 - Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate
Explain why risk assessment measures are widely used : Discuss the reasons that a sex offender is compared to other sex offenders when conducting a sex offender risk assessment.
Calculate the derivative using differentiation rules : Explain how you could have predicted the derivative by using algebra before taking the derivative.
Provide an analysis on the four market structures : Provide an analysis on the four market structures covered in class and our text; Pure Competition, Monopolistic Competition, Oligopoly & Monopoly.
Discuss hereditary through genetic variations : Genetic models for mood disorders hypothesize that mood disorders are hereditary through genetic variations

Reviews

len1603825

8/18/2017 1:52:20 AM

Requirements Your submission must be in a form readable by Microsoft Word format. • A cover page (outside the page limit) must be included and should contain relevant identifying information (Name, Student ID#, Subject Code, Session, Assessment No.) • Your discussion postings are considered part of your assignment submission and are thus subject to Faculty regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced. You should clearly indicate the start and end of any such text. • Your discussion postings will be required to complete your assignment but do not directly form part of the assessment of the assignment. As such, no formal feedback will be provided regarding your discussions.

len1603825

8/18/2017 1:52:14 AM

• References (You must cite references to all material that you have used as sources for the content ofyour work. Follow the referencing guidelines for APA 6 as specified in Referencing Guides.) • Glossary (Preferable) A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references. • Appendices (Preferable) You can attach any supporting material such as printouts of particular items of evidence, feedback from your cohort colleagues etc. Submit the assignment in ONE word or pdf file via Turnitin. Please do not submit *.zip or *.rar or multiple files.

len1603825

8/18/2017 1:52:08 AM

Presentation While there is no prescribed format for this report, the following should be included in the report: • Executive Summary or Abstract (Provide a brief overview, your involvement/contribution, major findings and conclusion) • Table of Content • Introduction • Copy of your published (to the forum/blog) research report (see marking criteria for details) • Summary of discussion in the forum (see marking criteria for details) • Any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. (see marking criteria for details) • Impact of the above mentioned issues and their application/impact in the real world. • Reflection on what you believe to be the most important lesson you have learnt as a result of these discussions. • Conclusion

len1603825

8/18/2017 1:52:00 AM

Rationale Depending on the topic selected, this assessment item relates to a number of key learning outcomes of your subject. Its also provides an opportunity for you to: - demonstrate factual knowledge, understanding and application of state-of-art information security; - demonstrates an understanding of what constitutes authoritative and valid evidence - demonstrate ability to identify, locate, critique, integrate and apply information from various topics and; - apply valid and applicable knowledge and understanding to a practical situation; - analyse current data to construct and communicate new knowledge - demonstrate ability to work in a team, sharing knowledge.

Write a Review

Computer Network Security Questions & Answers

  Difference between a private key and a secret key

Explain the difference between a private key and a secret key and describe and explain, at least, seven different physical characteristics

  Application of principles of ethics to ict-related issues

Demonstrate factual knowledge, understanding and the application of principles of ethics to ICT-related issues and demonstrate depth of analysis by examining arguments for one ethical issue related to ICT

  Typical network security problem

The topic, may be of your interest, needs to be approved in advance by the course convenor Dr Xin-Wen Wu; other than that, there are no restrictions.

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  The impact that other factors such as physical security

Describe how the implementation process for such controls might vary based on the business type. Determine the impact that other factors such as physical security, device type, and connectivity (wireless or wired) might have on the choices that ar..

  Facility network security

Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility, Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve th..

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Identity information of customers and employees

In 300- to 400-words, explain why security professionals must be aware of the requirements for protecting personal identification information (PII) that may be stored on organizational information systems. Also, describe phishing and how it can be ..

  How to use tools to evaluate best security mechanisms

How to use tools to evaluate best security mechanisms for dealing with internal and external threats Consolidate all sections of the paper

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Creating a presentation regarding system security

Your quality improvement circle has been assigned the task of creating a presentation regarding system security as it applies to the ability of the general public access to a combined personal and the electronic medical record housed by the hospit..

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd