Emerging threats related to use of networks, Computer Network Security

Assignment Help:

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment. 

Note:  before commencing research on the topic, you must seek approval from your tutor or, if you are a FLEX student, the course coordinator.

Research report topic:

The second assignment requires that you address the following topic:

Considering all current, foreseeable and emerging threats related to use

of networks, provision of services and data security, discuss what you believe is the greatest security-related threat toone of the following:

civil freedom,

governments or to

business and the economy.

In responding, you should provide a brief history of the threat or issue, argument for its importance and discussion of relevant Australian and/or International law, controls, countermeasures or circumvention mechanisms.

Examples of topics you may wish to consider are:

Wikileaks

Great Firewall of China

Australian Internet Content Filter

Cybercrime

Cyber terrorism

Identity Theft

The report in the second assignment will be 5000 - 7500 words (including references)

Proposal Requirements:

For this question, you must develop a proposal for a topic for the second assignment.  Your proposal should be no more than 1500 words(including references), clearly describe the topic and articulate why it is important.  You should briefly discuss the key issues you will be discussing in your report and give a broad outline of the report structure.

Your proposal should contain a brief but focused literature review, examining relevant industry and academic sources.  The literature review needs to be directly linked to your topic and the issues you intend discussing in your report.  You need to be clear about explaining why the points made in the literature are relevant to your assignment.  Inclusion of generalised security-related literature or literature that lacks relevance will lead to low marks.

It is suggested that you gather at least 5 - 10 key pieces of literature for this stage of the report:  you will almost certainly use more in order to complete assignment 2.  Note:  it is better to have a smaller number of well-analysed pieces of literature than a larger number of irrelevant or generalised references.


Related Discussions:- Emerging threats related to use of networks

Explain the limitations of a firewall, Question: (a) Mention three lim...

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Backup, types of firewall and backup

types of firewall and backup

Define full-duplex., A  full-duplex (FDX) , accepts communication in both...

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Traditional network design approach, Question: a) Give two reasons why ...

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis

Carrier sense multiple access (csma), CARRIER  SENSE MULTIPLE ACCESS (CSMA...

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

Complexity of network systems, Computer networks is a complex subject due t...

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

SNORT, Detect each visit to www.google.com that is made by the machine. o S...

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

Why use an ids, WHY USE AN IDS? IDS prevent from problem behaviors by in...

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd