Emerging threats related to use of networks, Computer Network Security

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment. 

Note:  before commencing research on the topic, you must seek approval from your tutor or, if you are a FLEX student, the course coordinator.

Research report topic:

The second assignment requires that you address the following topic:

Considering all current, foreseeable and emerging threats related to use

of networks, provision of services and data security, discuss what you believe is the greatest security-related threat toone of the following:

civil freedom,

governments or to

business and the economy.

In responding, you should provide a brief history of the threat or issue, argument for its importance and discussion of relevant Australian and/or International law, controls, countermeasures or circumvention mechanisms.

Examples of topics you may wish to consider are:


Great Firewall of China

Australian Internet Content Filter


Cyber terrorism

Identity Theft

The report in the second assignment will be 5000 - 7500 words (including references)

Proposal Requirements:

For this question, you must develop a proposal for a topic for the second assignment.  Your proposal should be no more than 1500 words(including references), clearly describe the topic and articulate why it is important.  You should briefly discuss the key issues you will be discussing in your report and give a broad outline of the report structure.

Your proposal should contain a brief but focused literature review, examining relevant industry and academic sources.  The literature review needs to be directly linked to your topic and the issues you intend discussing in your report.  You need to be clear about explaining why the points made in the literature are relevant to your assignment.  Inclusion of generalised security-related literature or literature that lacks relevance will lead to low marks.

It is suggested that you gather at least 5 - 10 key pieces of literature for this stage of the report:  you will almost certainly use more in order to complete assignment 2.  Note:  it is better to have a smaller number of well-analysed pieces of literature than a larger number of irrelevant or generalised references.

Posted Date: 3/1/2013 12:13:15 AM | Location : United States

Related Discussions:- Emerging threats related to use of networks, Assignment Help, Ask Question on Emerging threats related to use of networks, Get Answer, Expert's Help, Emerging threats related to use of networks Discussions

Write discussion on Emerging threats related to use of networks
Your posts are moderated
Related Questions
crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you