Describe the security features available on a platform of

Assignment Help Computer Networking
Reference no: EM13379944

? Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

? Include in your discussion:

Introduction: Clearly state your chosen platform and threat, and the technical controls that are available. Marks are allocated for clearly stating the choice of platform and attack: they should be interesting, clear, and have an appropriate scope to form the basis for the report. There are also marks for an overview of the technical controls that are available to mitigate the threat.

Literature review and threat mitigation: Provide a detailed literature review: that is, an overview of the related literature and history (NOT a description of how you conducted the research). Include details on the threat, and how the threat is mitigated, in both cases include technical detail, history, and notable people and events. Aim to include references to seminal (historically important) and scholarly research, such as journal and conference papers. Describe the relationship to related attacks, and make a clear distinction between security controls that are built into the platform, and those that are third party addons.

Configuration: Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

Limitations and critical reflection: You should reflect critically on the state of the art of security mechanisms and explore any limitations of the security mechanisms or areas for improvements. Marks are allocated for clearly describing the scope of protection and discussion of possible future improvements and areas of active research.

Conclusion. Summarise and conclude your report. In general, you should not bring up new content in a conclusion, but rather highlight the most important aspects.

The report should include a word count, have subheadings and use Harvard referencing.

Reference no: EM13379944

Questions Cloud

Assignment on mirror mirror on the ceiling flexible : assignment on mirror mirror on the ceiling flexible wireless links for the data center.please answer the following
Information has many facets value confidentiality integrity : information has many facets value confidentiality integrity privacy legality and so on. all information is not the same
Section 1 aims objectives and possible outcomesprovide : section 1 aims objectives and possible outcomes.provide a clear statement of the aims and objectives of the data
You are a consultant for being brought in by xumuc to : you are a consultant for being brought in by xumuc to assist with a merger with another company.backgroundxumuc is has
Describe the security features available on a platform of : ? describe the security features available on a platform of your choice for example linuxandroidmac os
Write a 2 page research paper on the turing and von neumann : write a 2 page research paper on the turing and von neumann models. compare and contrast each and discuss which model
The cto informed you that the board of executives showed : the cto informed you that the board of executives showed great interest in building a new network based on the work you
Each person in your team will complete one sequence : each person in your team will complete one sequence problem problem 1 or 2. one selection problem problems 3 4 or
1 what are the advantages and disadvantages of having a : 1. what are the advantages and disadvantages of having a small number of sectors per disk cluster? hint you may want to

Reviews

Write a Review

Computer Networking Questions & Answers

  Content validation-web pages before put in public domain

Do you believe that any form of document content validation must be applied to web pages before they are placed in  public domain? That is, some form of assurance that they don't contain completely incorrect information.

  Why is t important to establish standards for lans

Why is t important to establish standards for LANs and what type of LAN is the ethernet system?

  Find x and y such that 401x + 34y = 1. show all calculation

1. Find x and y such that 401x + 34y = 1. Show all calculation 2. Find all primes p for which (4 1 5 5) is not invertible mod p. (this is supposed to be a matrix).

  Search a number of antivirus companies eg symantec mcafee

search a number of antivirus companies e.g. symantec mcafee kaspersky f secure avg bitdefender webroot eset gdata avira

  Create technique to establish tcp connection

Try to create a technique which will allow Arnold to establish a TCP connection with Bernard without application-specific NAT configuration. If you have difficulty devising such technique, explain why.

  How company ensure adequate destruction of materials

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Explain comprehensive disaster recovery plan for network

Explain a comprehensive disaster recovery plan for hypothetical network consisting of 20 desktop computers in domain network with 2 network servers and 2 application servers.

  Use a straight-through cable to connect to hub

Assuming you use a straight-through (not a crossover) cable, what port on hub A will you use to connect it to hub B?

  Your friend has a small design shop with windows nt 40

your friend has a small design shop with windows nt 4.0 windows 2000 and windows xp workstations. he has one older

  Question 1pats engineering works is a small organization

question 1pats engineering works is a small organization that specializes in complex engineering consulting projects.

  Define switched backbone networks

You are the network administrator for a small manufacturing firm that runs Ethernet. You are currently using hubs and repeaters for connectivity but have decided to upgrade to a Layer 2 (L2) switched infrastructure.

  Explain effect of tcp flow control

Host A can send application data into link at 100Mbps but Host B can read out of its TCP receive buffer at maximum rate of 50Mbps. Explain the effect of TCP flow control.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd