Understanding and perspective of current hot topics

Assignment Help Computer Network Security
Reference no: EM13837827

Task:

Below are list of topics. You are required to -

• Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions... etc.)

• Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly.

• Raise questions about the information provided by other students (this must be done in an adequately professional manner)

• Respond to questions raised about your own information and other student's

• Contribute to discussions in general

Note that the aim of this task is:

i. to build an understanding and perspective of current hot topics in Information Security; and

ii. to build generic skills including, but not limited to:

o a capacity for teamwork and collaboration;
o an ability for critical thinking, analysis and problem solving;
o information technological literacy;
o a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.

Topics Set

1. US cryptography export restrictions: past, present, and future.

2. Biometrics for authentication: security and privacy implications.

3. Denial of service and distributed denial of service attacks.

4. Malware: past, present and future.

5. Employee privacy and email, WWW, and instant messaging.

6. Security threats to mobile devices and countermeasures.

7. Security threats in cloud computing and preventive methods.

8. Security threats in smart devices.

9. Data Exfiltration.

10. Wireless Network security and preventive methods.

Verified Expert

Reference no: EM13837827

Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this p

Write a paper about malware that could cripple organization

Write a paper about malware that could cripple your organization. You have been tasked to describe the ways in which different malware function. You also must provide at least

Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk miti

Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

Network threats

confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and c

Describe as the explosive growth in digital crime

Name at least three factors that have lead to what some authors describe as the "explosive growth" in digital crime and cyber victimization. Provide some examples of what an

Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Contro

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd