Discuss distributed denial of service attacks

Assignment Help Basic Computer Science
Reference no: EM131483309

Question: TaskBelow are listed a list of topics. You are required to -

Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions... etc.)Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly.Raise questions about the information provided by other students (this must be done in an adequately professional manner)Respond to questions raised about your own information and other student'sContribute to discussions in general

Note that the aim of this task is:

1.to build an understanding and perspective of current hot topics in Information Security; and

2. to build generic skills including, but not limited to:

a capacity for teamwork and collaboration;an ability for critical thinking, analysis and problem solving;information technological literacy;a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.
Topics Set1. US cryptography export restrictions: past, present, and future.2. Biometrics for authentication: security and privacy implications.

3. Denial of service and distributed denial of service attacks.

4. Malware: past, present and future.

5. Employee privacy and email, WWW, and instant messaging.

6. Security threats to mobile devices and countermeasures.

7. Security threats in cloud computing and preventive methods.

8. Security threats in smart devices.

9. Data Exfiltration.

10. Wireless Network security and preventive methods.

11. Security issues in Software Defined Networks (SDN)

12. Security and privacy issues in Internet of Things (IoT)

Your submission :You are required to prepare and submit a report on your topic to address the following questions (the length of the report within 1500~2000 words, excluding references):

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.d. Discuss the impact of the above mentioned issues and their application/impact in real life.e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.f. Provide references (at least three) using APA referencing system including in text citations.

RationaleThis assessment item relates to the learning objectives and to demonstrate your understanding of the material in different topics of your subject.

Its also provides an opportunity for you to :

demonstrate factual knowledge, understanding and application of state-of-art information security;demonstrate ability to integrate and apply information from various topics and ;apply understanding and knowledge to a practical situation;demonstrate ability to work in a team, sharing knowledge.PresentationThe following should be included as requirements in the report structure:

• Executive Summary or Abstractprovide a brief overview, your involvement/contribution, major findings and conclusion

• Table of Content

• IntroductionBackground,scope of engagement,tools used andsummary of findingsImpact in real life etc.

• Conclusion

• ReferencesYou must cite references to all material you have used as sources for the content of your workFollow the referencing guidelines for APA 6 as specified in Referencing Guides.

• Glossary (Preferable)A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.

• Appendices (Preferable)You can attach any supporting material such as printouts of particular items of evidence, feedback from your cohort colleagues etc. .

Submit the assignment in ONE word or pdf file on Turnitin. Please do not submit *.zip or *.rar or multiple files.
RequirementsYour submission must be in a form readable by Microsoft Word format.

• A cover page (outside the page limit) must be included and should contain relevant identifying information.

• Your discussion postings are considered part of your assignment submission and are thus subject to Faculty regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced. You should clearly indicate the start and end of any such text.

• Your discussion postings will be used required to complete your assignment but do not directly form part of the assessment of the assignment. As such, no formal feedback will be provided regarding your discussions.

Reference no: EM131483309

Questions Cloud

What would you focus on in the re-training program : How can you introduce your new policy without creating resentment among the reps? What would you focus on in the “re-training” program?
Hand held tools that are carefully crafted for local markets : A small manufacturing firm believes there is a market for hand held tools that are carefully crafted for local markets.
Find the order quantity that will minimize total annual cost : A jewelry firm buys semiprecious stones to make bracelets and rings. find the order quantity that will minimize total annual cost.
What are critical success factors for project integration : What are the critical success factors for project integration? How do You Best Control Project Integration Activities?
Discuss distributed denial of service attacks : Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief.
Define the steps in the new product development process : define the steps in the new product development process and the major considerations in managing this process successfully.
Develop mathematical model for the total profit realized : Develop a mathematical model for the total profit realized from an order for x pairs of shoes.
Define functional requirements : BackgroundRefer to background information provided in Assessment 1 regarding the Commonwealth Government ‘My Health Record' project.Complete the Following.
How did the author synthesize or organize the information : What type of data was used for the research? How did the author synthesize or organize the information?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The current source file or in any source file

a. Determines whether an identifier is known only in the current source file or in any source file with proper declarations.b. Determines the period during which that identifier exists in memoryc. Determines where the identifier can be referenced in ..

  Minutes on the viewing platform

On average, 30% of the tourists only visit Level 1 and return to the ground, while 70% visit both levels. On a typical day, the average tourist visiting Level 1 spends 15 minutes on the viewing platform, while the average tourist visiting Level 2..

  What type of data model you are developing

Provide a brief description about what type of data model you're developing, along with a project description.

  Find a combined array design for this experiment

Reconsider the wave soldering experiment in Problem 12.16. Find a combined array design for this experiment that requires fewer runs.

  Advantages or disadvantages between the two

There are two types of hypervisors (bare-metal) and hosted. What are the advantages or disadvantages between the two?

  Incident be an example of social engineering

You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.

  What cost cutting measures are proposed

What cost cutting measures are proposed and How will the expanded coverage be paid for?

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Formulating and selecting dss implementation strategies

Discuss the considerations for formulating and selecting DSS implementation strategies.

  Should an economic model describe reality exactly

Draw and explain a production possibilities frontier for an economy that produces milk and cookies. What happens to this frontier if disease kills half of the economy's cow population?

  Recursive method written by you or taken from web

What elements should be considered to be included in any recursive method? Discuss these elements using an example (code required) of a recursive method written by you or taken from Web. Try choosing one different from that of any posted thus far.

  Compute the area of square and print

Compute the area of square and print

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd