Tools and techniques for computer systems security

Assignment Help Computer Network Security
Reference no: EM132286119

Aim:

1. To implement the skills and knowledge gained through the course.

2. To achieve greater awareness of the latest security tools and techniques for computer systems security.

Word length for body of report: 3000-3500 words (excludes any appendices or references)

Instructions

Part A: Assignment tasks

You are to select any one scenario for your report in consultation with your tutor. Your report on the scenario should be between 3000 and 3500 words. The emphasis of the report should be related to computer systems security.

Scenario 3: Encrypting Messages

As a security consultant for Allnet Solutions you have been contacted regarding assisting them with a new project.Allnet Solutions has offices in several parts of New Zealand. Allnet Solutions have asked for your help. Create a report that lists different types of email cryptography security options that can be implemented, along with their advantages, disadvantages, and case of use. include those packages that work with Lotus Notes, Pegasus, Microsoft Outlook and Novell GroupWise. Rank the packages according to the criteria: are the easiest to use and have the most features.

1. Prepare a PowerPoint presentation summarizing your report for presentation in class

2. Be ready to discuss and demonstrate your case study findings in the class.

Presentation;
1. Report writing: Prepare a comprehensive report which incorporates results of investigation, discussion, implementation and analysis from previous steps. Your ability to correctly use terminologies, existing models, threat life cycle, attack steps and mitigations will be evaluated during our review. Organize your report for readability and integrity and create Appendices wherever appropriate.

2. Report should follow Unitcc's standard format (3000 - 3500 words, less than 20% quoted)
a. Title page
b. Table of contents
c. Abstract or ExecutiveSummary
d. Introduction
e. Methodology
f. Implementation
Detail discussion and analysis of chosen scenario
g. Summary and Recommendation
h. Impact of recommendation on Maori & Pacific communities.
i. Reflection
j. References (in IEEE style)
k. Presentation/Demo

3. Please use MS Word and print out a hard copy (in addition to a soft copy)

4. There will be additional quizzes during class time that may contribute to the above marking

Verified Expert

he following assignment is a report on the different email encryption techniques that can be used by a business organisation, which in this case is Allnet Solutions, a company in New Zealand. The first part of the paper assesses the options available for email security, and states the reasons and justifications of why they must be used. The report then goes on to explain, which tool should be implemented, with reasons for the same. A presentation/demo on the report has also been attached. The report has been prepared using Microsoft Office Word, while the presentation has been created with Microsoft PowerPoint.

Reference no: EM132286119

Questions Cloud

Comparing sales performance of various product lines : Comparing sales performance of various product lines between different types of countries, notices what appears to be a recurring anomaly.
Discuss about integration of built and natural systems : Building off your completed sketching assignments, if you found particular interest in any of them, could be a good place to start. And for some of you.
What is the implied discount rate in an annuity product : 1. What is the implied discount rate in an annuity product that costs $50,000 today and pays the owner twenty annual payments
Discuss nongovernmental actors : Discuss nongovernmental actors and how they interact with each branch of government throughout the policy process.
Tools and techniques for computer systems security : Prepare a comprehensive report which incorporates results of investigation, discussion, implementation and analysis - Organize your report for readability
Branch of government throughout the policy process : Discuss nongovernmental actors and how they interact with each branch of government throughout the policy process.
What is the preferred stock price per share : A share of a preferred stock pays a dividend of $0.41 annually. The required rate of return is 2%. What is the preferred stock's price per share?
Conduct pre-employment background investigations : Why is it important to conduct pre-employment background investigations? How would you go about doing so?
Compare the visual elements of cultural familiarity : Compare and contrast the visual elements of cultural familiarity. Explain why it is important to use culturally familiar visuals that are quite different.

Reviews

len2286119

4/17/2019 3:20:16 AM

Assignment Please read carefully Criteria on Report (40%) Your report will deserve an A grade when above requirements are met in full. Your reports will be marked on content, report style, and appropriate and correct English. While I will be concentrating on the quality and comprehensiveness of your report, weakness in one area will result in a B grade. Poor critiquing will receive a score no more than C grade.

len2286119

4/17/2019 3:19:34 AM

Marks will be deducted if you fail to draw upon appropriate professional and academic literature in your writing andiftheassignmentisnotwrittenand presented ina professional manner.Youcanquoteother people'swork(websites, conference proceedings. industry magazines, journals, and books) provided that you cite and reference them correctly in your report. However, mostof your reportshould be your own ideas and thoughtswritten inyour words. Each quotation ortable or diagram from another sourcemust be accompanied by a discussion in your own words. For example, if you have included a table from another source then you must writeabout what you think the tableshows.whyyou have included &why it is relevant and so on. Please remember to format your report so that it is easy to discern your thoughts and ideas from your sources' thoughts and ideas.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd