Technical report on a network security topic

Assignment Help Computer Network Security
Reference no: EM131265450 , Length: word count:1000

Instructions:

You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecturer in Week 3/4.

You will be required to search relevant educational databases using Proquest, ERIC or others from your library for a minimum of two recent (>2013) refereed academic papers on your topic. Based on your research you will use relevant literature and published papers to write a technical report (minimum two pages for the body or "core text of the report) on your topic. The report should be to your tutor. You will need to give an overview on the papers themselves (reliability, choice of methodology etc. - a literature review) to set the context of the topic and then report on your conclusions.

You are required to:

- Undertake a literature review of a topic - refer to the following

- https://www.adelaide.edu.au/writingcentre/leaming_guides/leamingGuide writingLiteratureReview.pdf

- https://www.monash.edu.au/Ils/lIonline/writing/general/lit-reviews/index.xml

- https://www.monash.edu.au/Ils/lIonline/writing/science/lit-review/index.xml

- Deliver a presentation - approximately 15 minutes with a 5 minute question time

- Submit your presentation materials (slides, handouts and any other material used).

- Submit a two page report in a technical report format (in pdf format, NOT zipped using your own words), with valid references

- Two pages is the 'text body" of the report - -1000 words ... there will of course be a number of other pages - see the report format below.

- One sentence contains an average of eleven words and one A4 sheet contains an average of between 32 to 35 sentences. Therefore an A4 sheet has an average of 350 to 400 words. However, this does apply to a relatively full A4 sheet with a standard layout and one that is filled with text to around 80-90% of its capacity.

- Your report must demonstrate in-depth academic research by including appropriate references from the Networking related Journals.

- Refer to https://www.monash.edu.au/Ils/lIonline/writing/engineering/technical-report/index.xml for a good format for technical reports.

- Referencing must be in WA format both for in-text and end-text references.

- The report must be submitted via eCampus

- The report must be handed in by the due date or a penalty will be applied (-5% per day late, marked as 0% after 5 days - see section on "Extensions for Submission Dates")

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - that is, it does not cover a network security topic, is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - tha does not cover a network security tonic. is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

Reference no: EM131265450

Questions Cloud

Terminology from the background materials : In preparation for the SLP, make sure you have a thorough grasp of the terminology from the background materials including the main individual and organizational factors that lead to political behavior and the types of political behavior. Once you..
Process of procuring the drug : In hospitals, errors are common during all steps of the medication-use process and the process of procuring the drug, prescribing, dispensing, administering, and monitoring the patient's response.
How public policies and other less formal responses working : What is the problem? Be sure to narrow your problem enough to allow a focused examination. What are the individual and social implications of this problem? Discussion of implications should be supported by accurate research data. What do the expert..
Locate four empirical studies that research change : Locate four empirical studies that research change. Give the APA-formatted citation and add the studies to your RefWorks list. What are the primary methodologies used in the four studies that you read?
Technical report on a network security topic : You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecture..
Discuss a job interview : Discuss a job interview you had at some point. Do you believe the interviewer asked appropriate questions based on the recommendations you have learned in this course?
Explain the information the cio requested in the scenario : Develop a 5- to 7-slide Microsoft PowerPoint slide presentation that includes the information the CIO requested in the scenario.
Select four graphics from newspapers or magazines : Select four graphics from newspapers or magazines. - Critique each graphic based on what you have learned. - What is correctly shown?
Define the various methodologies for sociological research : Define the basic concepts used in the discipline of sociology. Define the various methodologies for sociological research. Use technology and information resources to research issues in sociology.

Reviews

len1265450

11/4/2016 3:18:39 AM

Marking criteria for presentationOn Topic content/explanation 20 On time 10 Use of up-to-date relevant examples 20 Presentation techniques 5 Presentation (PPT) format 5 Conclusion 5 References (choice of/quality) 15 In-depth knowledge of topic 10 Report / resources used 10 Total Marks 100 Note: the resentation will receive zero marks if it does not address the aim of bein. a iresentation of our literature review

len1265450

11/4/2016 3:18:22 AM

• Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment — tha does not cover a network security tonic. is not a literature review or has very poor referencing. • The report will be marked at zero percent if it is not a literature review.

Write a Review

Computer Network Security Questions & Answers

  Explain how files on the network may be accessed by lsdg

Explain how files on the network may be accessed by LSDG

  How message segmentation can reduce end-to-end delay

What do you think is the best choice of N from an efficiency standpoint? Does your answer change depending on the value of tprop?

  What are the risks of implementing this technique

list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?

  Analyze the existing security situation in the organization

Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks. Explain the importance of explicit enterprise security policies and procedures.

  Methods to combat technical-nontechnical attacks in wan

Explain a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks.

  Why is the nfs option grayed out on the share protocols page

Why is the NFS option grayed out on the Share Protocols page and According to the Server Manager console, what roles are currently installed on the computer

  Suggest mitigation strategies for vulnerabilities identified

Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network.

  Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..

  Computer security is not an issue for organizations alone

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.

  Relationship between it execution and it governance

What is the relationship between IT execution and IT governance - describe how the COBIT framework institutes mechanisms to control IT risk.

  The difference root cause analysis and simply identifying

It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis, which not only helps to determine the right problems to attack, but also t..

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd