Discuss distributed denial of service attacks

Assignment Help Basic Computer Science
Reference no: EM131483309

Question: TaskBelow are listed a list of topics. You are required to -

Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions... etc.)Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly.Raise questions about the information provided by other students (this must be done in an adequately professional manner)Respond to questions raised about your own information and other student'sContribute to discussions in general

Note that the aim of this task is:

1.to build an understanding and perspective of current hot topics in Information Security; and

2. to build generic skills including, but not limited to:

a capacity for teamwork and collaboration;an ability for critical thinking, analysis and problem solving;information technological literacy;a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.
Topics Set1. US cryptography export restrictions: past, present, and future.2. Biometrics for authentication: security and privacy implications.

3. Denial of service and distributed denial of service attacks.

4. Malware: past, present and future.

5. Employee privacy and email, WWW, and instant messaging.

6. Security threats to mobile devices and countermeasures.

7. Security threats in cloud computing and preventive methods.

8. Security threats in smart devices.

9. Data Exfiltration.

10. Wireless Network security and preventive methods.

11. Security issues in Software Defined Networks (SDN)

12. Security and privacy issues in Internet of Things (IoT)

Your submission :You are required to prepare and submit a report on your topic to address the following questions (the length of the report within 1500~2000 words, excluding references):

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.d. Discuss the impact of the above mentioned issues and their application/impact in real life.e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.f. Provide references (at least three) using APA referencing system including in text citations.

RationaleThis assessment item relates to the learning objectives and to demonstrate your understanding of the material in different topics of your subject.

Its also provides an opportunity for you to :

demonstrate factual knowledge, understanding and application of state-of-art information security;demonstrate ability to integrate and apply information from various topics and ;apply understanding and knowledge to a practical situation;demonstrate ability to work in a team, sharing knowledge.PresentationThe following should be included as requirements in the report structure:

• Executive Summary or Abstractprovide a brief overview, your involvement/contribution, major findings and conclusion

• Table of Content

• IntroductionBackground,scope of engagement,tools used andsummary of findingsImpact in real life etc.

• Conclusion

• ReferencesYou must cite references to all material you have used as sources for the content of your workFollow the referencing guidelines for APA 6 as specified in Referencing Guides.

• Glossary (Preferable)A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.

• Appendices (Preferable)You can attach any supporting material such as printouts of particular items of evidence, feedback from your cohort colleagues etc. .

Submit the assignment in ONE word or pdf file on Turnitin. Please do not submit *.zip or *.rar or multiple files.
RequirementsYour submission must be in a form readable by Microsoft Word format.

• A cover page (outside the page limit) must be included and should contain relevant identifying information.

• Your discussion postings are considered part of your assignment submission and are thus subject to Faculty regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced. You should clearly indicate the start and end of any such text.

• Your discussion postings will be used required to complete your assignment but do not directly form part of the assessment of the assignment. As such, no formal feedback will be provided regarding your discussions.

Reference no: EM131483309

Questions Cloud

What would you focus on in the re-training program : How can you introduce your new policy without creating resentment among the reps? What would you focus on in the “re-training” program?
Hand held tools that are carefully crafted for local markets : A small manufacturing firm believes there is a market for hand held tools that are carefully crafted for local markets.
Find the order quantity that will minimize total annual cost : A jewelry firm buys semiprecious stones to make bracelets and rings. find the order quantity that will minimize total annual cost.
What are critical success factors for project integration : What are the critical success factors for project integration? How do You Best Control Project Integration Activities?
Discuss distributed denial of service attacks : Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief.
Define the steps in the new product development process : define the steps in the new product development process and the major considerations in managing this process successfully.
Develop mathematical model for the total profit realized : Develop a mathematical model for the total profit realized from an order for x pairs of shoes.
Define functional requirements : BackgroundRefer to background information provided in Assessment 1 regarding the Commonwealth Government ‘My Health Record' project.Complete the Following.
How did the author synthesize or organize the information : What type of data was used for the research? How did the author synthesize or organize the information?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd