Emerging area in computer networking

Assignment Help Computer Network Security
Reference no: EM131643551 , Length: word count:2000

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security

Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Demonstrate professional and ethical behaviour with regard to network security.

Submission Guidelines -

All work must be submitted on Moodle by the due date along with a title Page.

The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.

Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Need in IEEE Style

Reference no: EM131643551

Questions Cloud

Solving problem of the basketball : Jeremiah has basketball practice two days a week. Ninety percent of the time, he attends both practices. Eight percent of the time, he attends one practice.
Differently to reduce or take away cause of the conflict : Identify any underlying causes of above conflicts and how things can be done differently to reduce or take away cause of the conflict.
Predict the stock price of facebook over the next five years : Predict the stock price of Facebook over the next five years, indicating the key drivers of the performance and the resulting impact to the stock price.
Compute the book value at the end of the third year : A legal office using the straight-line method of depreciation purchased office furniture costing $36,000 and Compute the book value at the end of the third year
Emerging area in computer networking : MN502 - Demonstrate professional and ethical behaviour with regard to network security - implement appropriate countermeasures for network security
Easy way to build brand awareness and generate new customers : hich give the impression that social media is an easy way to build brand awareness and generate new customers.
Define critical indicators of a patients current state : Campbell (2004) reports a relational database is "used to track patient care in the form of treatments, outcomes of those treatments
What does the relative frequency column sum to : Toss a coin ten times and record the number of heads. After all members of the class have completed the experiment.
Compute the book value at the end of the second year : Compute the book value at the end of the second year. Round depreciation amounts to the nearest dollar

Reviews

len1643551

9/15/2017 5:37:11 AM

Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised

len1643551

9/15/2017 5:37:02 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation

len1643551

9/15/2017 5:36:56 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1643551

9/15/2017 5:36:49 AM

Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1643551

9/15/2017 5:36:43 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6

Write a Review

Computer Network Security Questions & Answers

  How has the role of private security changed since the 911

1. how has the role of private security changed since the 911 attacks?what are some of the roles that private

  Explain the whole learning process of the switches

Consider  an institutional LAN Shown in the figure below that is composed of five host (A,B,C,D,E) and two transparent switches (Switch 1 and Switch 2). Assume that frames are exchanged as follows. Explain the whole learning process of the Switches.

  Describe the lan wan internet intranet and extranet

WLAN wireless local area network I think will be my choice network to plan some policy for security. Describe the Local Area Network (LAN), Wide Area Network (WAN), Internet, intranet and extranet.

  Write udp programs to establish communication channel

Write UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Discuss about the network architecture and security

Publications from the Strayer Learning Resource Center are also available. Additional resources should be used when necessary. Write a twelve to eighteen (12-18) page Security Administrator's handbook including policies tailored to your work envir..

  Write the word statistic without the repeated letters

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters. In this case, the message HELLO becomes ECJJM.

  Introduction to network engineering

1. What was the main difference between 1G and 2G cellular systems? 2. Discuss the technological evolution from circuit switching to packet switching in cellular telephony.

  Telling private industry how to set up or improve security?

justify telling private industry how to set up or improve their cybersecurity?

  Describe the technical characteristics of the dark web

Describe the technical characteristics of the Dark Web ensuring you explain how it works and its underlying technologies - Discuss the impact of the Dark Web on society. In addressing this point, ensure you discuss its purpose and the forces behind i..

  What you believe to be the two most important security

Read the article titled "Securing the Cloud for the Enterprise". Discuss what you believe to be the two most important security considerations related to cloud deployments.

  Selecting a programming language to develop secure software

The personnel manager asks you to follow up with a short paper to her briefly going over the topics you discussed. She would like the document as a memo, highlighting the subject areas you thought worthy enough to bring to her attention during the di..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd