Examine malicious activities that may affect the security

Assignment Help Other Subject
Reference no: EM132309405

Assessment item - Research project (Report)

Task

In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:
• Overview of the technology involved
• Relevant technologies and applications of those technologies
• Highlighting the challenges/problems in your chosen research area
• Identification of any gaps in the literature by:
o discussing areas/issues that you believe have been addressed in the current literature;
o highlighting areas/issues that have not been addressed or adequately addressed; and
o discussing your view(s) on the issue(s) that you see as being critical.
• Summarize the future research directions based on the identified gaps
To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 5 research articles. Students are encouraged to access such research articles from well-known and reputed research portals such as IEEE, ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations.

Rationale

This assessment task will assess the following learning outcome/s:
• be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
• be able to explain the fundamental concepts of cryptographic algorithms.
• be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
• be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general-purpose operating system.
• be able to investigate and justify the use of the access control mechanisms and user authentication processes.
• be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.
This assessment continues links back to assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security.The aim of this task is to help students :
• to demonstrate ability to integrate and apply information from various topics;
• to build an understanding and perspective of current and emerging topics in Information Security;
• to help the students to formulate their research project in a step by step manner; and
• to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security

Verified Expert

This particular research paper generally focused on data exfiltration techniques and it also signifies the operation as well as the mechanism of various techniques that are involved in Data exfiltration procedure. The main objective of this paper is to prevent the data filtration technique by using another framework so that it described some data architecture models that help the business organizations or individuals to detect the malicious activities in an efficient manner. This research project also identifies the major challenges faced by the organization due to data exfiltration.

Reference no: EM132309405

Questions Cloud

What is the ads overall promotional message : Part of advertising is also about the appeal and brand promise of a certain image. Knowing what messages match the market is critical in the ad campaign.
Nike any different now after viewing video : Is your opinion of Nike any different now after viewing this video? Would this change your buying behavior with respect to Nike products?
Improve this situation since 2011 video : Explain what Nike has done to improve this situation since this 2011 video. Include the use of codes of ethics and other ethical standards implemented
Why the sales team should or should not sell the product : Create a PowerPoint presentation (8-10 slides) designed to deliver the research findings and recommendations in your Marketing Analysis Research Report to your.
Examine malicious activities that may affect the security : explain the fundamental concepts of cryptographic algorithms - examine malicious activities that may affect the security of a computer program and justify
Fair assessment of ethical standards : From Nike's standpoint, is this a fair assessment of their ethical standards? Explain the some of the ethical issues that Nike is facing in the case.
Integrity and other business ethics practices : Bring in the concepts of social responsibility, integrity and other business ethics practices.
What are the differences and commonalities of the methods : What are the differences and commonalities of these methods? When can you see an advantage in the use of a quantitative method?
Which is mandatory as an industry standard : Define the legislation " ISO 10002 Customer Satisfaction and Complaints Handling" Which is mandatory as an industry standard.

Reviews

len2309405

5/21/2019 2:40:54 AM

Please note: Assessment MUST be submitted as ONE MS Word file via TURNITIN. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.

len2309405

5/21/2019 2:40:47 AM

APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link. This also forms a part of the marking

len2309405

5/21/2019 2:40:41 AM

The final submission must be in MS Word format using the given template that is available from the subject site under Assessment 5 folder in the Resources section. Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or unreferenced).

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd