Demonstrate project leadership skills

Assignment Help Computer Networking
Reference no: EM131643648 , Length: word count:2000

Part -1:

Title - Overview of Network Security

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security

Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Part -2:

The purpose of this assignment is to develop a well-researched project planning document based on the overall parameters of a networking related project, establish an appropriate project management plan, and quality environment required to complete the chosen project. Furthermore, analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects. It addresses the following learning outcomes:

- understand project management as a strategic tool, framework, or methodology for business development;
- analyse and apply a range of technologies and techniques that are appropriate to the needs and requirements of the project - particularly in the areas of scope and planning projects;
- demonstrate project leadership skills; identify and assess risk in designing, executing a major project;
- critically reflect on current project management ethics, research, theory and practice;
- identify, analyse, compare, interpret and present the use of a project management tool (e.g., MS Project);
- manage projects effectively through planning, leadership, monitoring and control;
- analyse various ICT services management systems.Purpose of the Assessment:
The purpose of this assignment is to develop a well-researched project planning document based on the overall parameters of a networking related project, establish an appropriate project management plan, and quality environment required to complete the chosen project. Furthermore, analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects.

In this assessment task, you will present a proposal for the major project assignment as a team of 3-4 members. Proposal template is available on Moodle. The project must be selected from the networking or the telecommunication area.

The project duration should not be less than 12 Months. Before starting, seek approval for the proposed project from your laboratory tutor. Address all stages of Project Management as outlined in the unit. A suitable project management software (e.g. MS Project 2010) must be used.

Assignment Description
The project report should include all phases of a project life cycle, i.e. Initiating, Planning, Executing and Closing. Project Management Plan helps the management team to maintain a constant focus towards delivering the project in accordance with the customer needs and expectations.

The development of such a plan begins with the business case (refined from the Project Charter), project objectives and goals, success criteria, scope, high-level schedule, stakeholder expectations, communication plan, benefits and costs, governance and resourcing, management approach, risk management plan, and potential ethical issues.

The project documents ensure a consistent understanding of the project, help to set expectations, and identify resources necessary to move the project to the next level of detailed planning. Every project must be delivered in a manner that captures the user's trust and confidence in the chosen projects ability to effectively and efficiently deliver quality services/products. In order to ensure project success, it is imperative that good project management principles are used early in the planning stages. As the project becomes more defined, the Project Management Plan becomes the tool by which the project is managed effectively.

Students should include all aspects of the project as if they were the Project Manager and it is a requirement of the subject that they include the use of software (e.g. Microsoft Project). Students are expected to show evidence of self-directed reading and research using credible resources including, but not limited to their prescribed text. The assignment will be marked on the basis of depth of analysis, research, references and integration of all aspects of project management.

Assessment will be on the basis of the realistic nature of the project and how well it is presented. You should present the final document in a form that would be consistent with the details of your chosen project, and written in Business English in a report format. Make sure that the timeline, the budget and the quality of the work is realistic, justifiable and sufficiently attractive to win a tender for a real project.

Requirements:

Form a team of 3-4 members and work co-operatively to complete the chosen project. The project report must cover at least the following aspects:
- A clear outline of the project including title, start and end date, goals and objectives, etc.
- Project requirements (both functional and non-functional)
- Project team members (title, skills/expertise, not names!)
- Project plan, including:
o Project scope
o Work Breakdown Structure (WBS)
o Estimated time-line
o Resource needs
o Gantt Chart and Network Diagram
o Estimated cost
o Quality plan
o Stakeholder analysis
o Communications plan
o Risks management plan
o Ethical issues analysis
o Project deployment plan
- Crash the total project duration by 2 weeks.
- Use software (e.g. Microsoft Project) to complete WBS, allocate time and resources, apply cost, and prepare Gantt chart and Network Diagram.
- Project Signoff (on a separate page)
- Post project review and recommendations The report should have a consistent, professional, and well-organized appearance. Create the report (Minimum 1800 Words) showing extensive use of MS Project.

1. The report should include the following:
- A cover page listing students name and ID, tutor name, and Assignment-2 as title.
- The assignment must use 1.5 spacing, 11-pt Calibri (Body) font with appropriate section headings.
- The report must include all sections listed in the Marking Criteria, with appropriate heading and sub-headings to create a well-presented and readable repot.
- Reference sources (APA style) must be cited in the text of the report, and listed appropriately at the end in a reference list.

2. The assignment must be submitted as a soft (electronic) copy under Moodle. The page number must appear on each page.

Reference no: EM131643648

Questions Cloud

Describe a specific and realistic change : Summarize how the change would align with the organization's mission, vision, and values as well as relevant professional standards
What is the average class size : What is the average class size assuming each class is filled to capacity?
What is the purpose of the statement of cash flows : What is the purpose of the statement of cash flows? What information does it provide
Saving the face of the person with whom you disagree : What is the connection between saving your own face and saving the face of the person with whom you disagree?
Demonstrate project leadership skills : Analyse and apply a range of technologies and techniques - presentation and present your work during the Lab -present a proposal for major project assignment
The different approache to deal with international terrorism : Explain the different approaches to deal with international terrorism, as well as Samuel Huntington theory of clash of civilization.
Discuss the current account and its components : Discuss the current account and its components and the capital and financial accounts and their components.
Define the random variable and list its possible values : In a lottery, there are 250 prizes of $5, 50 prizes of $25, and ten prizes of $100. Assuming that 10,000 tickets are to be issued and sold.
What type of government does germany have : What type of government does Germany have? Is the president the head of date or government, or is the chancellor the head of state or government?

Reviews

len1643648

9/15/2017 6:03:00 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1643648

9/15/2017 6:02:51 AM

Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE

len1643648

9/15/2017 6:02:44 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1643648

9/15/2017 6:02:37 AM

Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1643648

9/15/2017 6:02:27 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6

len1643648

9/15/2017 6:02:08 AM

Marking Rubric Grade Marks Quality Grade Marks Quality Grade Marks Quality Grade Marks Quality Grade Marks Quality HD 80-100% D 70-79% CR 60-69% P 50-59% Fail <50% Quality: Excellent Very Good Good Satisfactory Unsatisfactory All topics are pertinent and Topics are Generally Some relevance This is not relevant to covered in depth. Ability to relevant and relevant and and briefly the assignment topic. think critically and source soundly analysed. presented. material is demonstrated analysed.

len1643648

9/15/2017 6:01:47 AM

Section-3: Project stakeholders, communications, risk management plan, and ethical issues. Stakeholder analysis, communication matrix, risk matrix, and ethical issues. 10 Section-4: Project Management software outputs The demonstration of scheduling, resourcing, and costing of different activities and tasks using a Project Management software. Required charts/graphs (Gantt chart, Network diagram, etc.) as extracted from the software. 10 Section-5: Project Deployment plan Description of project deployment plan 4 Section-6: Project signoff, project review and recommendations Project signoff letter, post-project review and recommendations 3 Section-7: Reference and appendices APA 3 Total 50

len1643648

9/15/2017 6:01:40 AM

Marking criteria: Sections to be included in the report Contents of the section Marks Section-1: Executive summary, introduction, logical structure and conclusion Executive summary, table of contents, introduction, logical flow of information and conclusion for the major project. The project should use a meaningful project title and a reasonable time period of 12 months or more. 5 Section-2: Project scope and project requirements. Project crashing. Well focused project Scope, WBS, estimation of Time, Cost, Quality key stakeholder s’ roles and responsibilities including project team. List of functional and non- functional requirements. Method for crashing the project time by 2 weeks. 15

Write a Review

Computer Networking Questions & Answers

  Fastest processor available today for desktop computers

What is the fastest processor available today for desktop computers? What about notebooks? Mobile devices? Which two companies are the main manufacturers of processors today?

  Describe and implement virtual local area networks

Describe and implement Virtual Local Area Networks (VLANs) on a computing network. Compare and contrast dynamic routing, distance vector routing, and link-state routing protocols.

  Process of interpreting a sender''s message into thought

In this print ad, the source of the advertising message is: the Tennessee Department of Tourist Development.

  What is the wi-fi alliance

Wireless Networking Technologies, What is the Wi-Fi Alliance, Give the numeric prefix IEEE standards use for Wi-Fi networks.

  Explain in some detail how a router works

Explain in some detail how a router works, and how it affects security. Define what a protocol is and identify the specific responsibilities of the communication protocol. What is the purpose of communication protocols?

  Identify key features of widely used business application

Identify key features of widely used business application programs.

  What are the different types of security

What is network security, What are the different types of security and how many are there and Compare small and big networks

  Unique network address and number of subnet

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Please reply to the Subnetting Discussion Topic under Week 3 Discussions with your selection. Don't select a network address that som..

  How did the computer find this web server''s ip address

I entered 'www.cybercrime.com' in my web browser and the web site comes up on my computer. How did the computer find this web server's IP address?

  How a firewall can distinguish between two incoming requests

Explain how a firewall can distinguish between two incoming requests allowing one while denying the other - Can someone provide the answer with reference to computer networking?

  What is the total file transfer time

How many packets must be transmitted to accomplish the file transfer - What is the total file transfer time.

  Analyze wireless technologies and mobile technologies

Analyze wireless technologies and mobile technologies. Next, determine at least three ways which companies or organizations utilize such technologies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd