Explain the functioning of security services

Assignment Help Other Subject
Reference no: EM132016870

Infrastructure and security

Learning Outcomes

- Explain the functioning of security services in computing environments and the security issues in mobile and loT computing,
- Describe and review emerging networking technologies

Assignment Details:

This assignment is to produce a report on the security issues that are relevant to the major topic classifications raised in assignment 1 by group members.

In other words, suppose the major topic headings 'Storage/size' and 'Networks/speed' were chosen, then the group should choose one of these, and expand on what kind of security mechanisms are in place. Note that the group members don't have to concentrate on speed or size. It is only the major topic headings that count.

If neither topic appeals, then the group members must email myself or the head tutor for approval for a new topic to be chosen.

The major domains are:
1. Tablets, Smartphones - the mobile aspect (only)
2. Sensor features
3. Compute
4. Storage
5. Operating Systems
6. Networks

Other combinations will be permitted but with prior email permission. In this case, please email me and CC the head tutor and explain which combination you wish to select, and once permission is given, please write this in the report.

Points to consider. in your report there should be at least:
o an introduction, describing the domain you will be discussing about
o at least 5 sections, each describing a particular security aspect
- not an incident or exploit, just an aspect that has affected design
- An example might be that Storage (say, NAS), needs group-based access control, so that the Payroll group only has access to the Payroll data. How would information be stored on NAS devices in order to support this?
Another example might be security at velocity. Data is coming in too fast for rthe usual PKI to be used, so storage, how is that problem dealt with. Sessions? User-based
or group-based? Location-based? IP-based? These all affect the design
- it may help if you think of real-world case-studies
- How does the bureau of meteorology deal with its data?
- Banks?
- Google vision?
o at least two security Incidents one of which is less than 5 years old that deal with the topic chosen.
- a subsection with the name of the exploit is desirable,
- The better-known exploits have distinctive names, as well as a logo. Store an image on one if one exists, but this is not mandatory
- This section is to include at least 3 links to newspaper articles about the exploit.
- This section is also to include at least 2 links to specialist articles that describe the exploit in great detail.
o Proper Referencing. You must cite using 'credible' references. These would include:
- Review articles from well-known magazines (no more than 2 citations from the same article);
- Academic journals or conference papers
(can be found using Google Scholar);
- NOT Wikipedia !!
- NOT blogs or videos (unless clearly from credible organisations, such as the manufacturer, a security organisation a university or similar independent body No personal blogs), although, like Wikipedia, there is nothing wrong with using these to find original, or more credible sources.

- For example, icrypto-gram' blog is a great initial source, but with links to the originals.
- Footnotes are not acceptable as the sole form of referencing
- If you want to use them, then say something like '2. Brainstorm logo is taken from [3]*, where 13] is reference 3 in your list.
Submission file format:
- PDF, and all references are to have clickable links to their sources.
Submission Size
- up to 10 pages of printed text, using size 12 font and including figures and tables Content Format
- Title page is optional, but it must have:
o Snappy Title (think of something that grabs the attention);
o Abstract: A single paragraph (around 100 words summarising your findings)immediately following the title;
o Student Names;
o Student IDs; Group ID
o Course Title and Semester/Year;
o Images of the 5 items with options which should include name, company and model numbers.

Verified Expert

In this assignment we have discussed two topics on IT AND BUSINESS and security issue associated with it. We have discussed ethical issue in business network as well as security issue in use of ERP software . Ais has been discuss a as example of ERP

Reference no: EM132016870

Questions Cloud

Metabolism of chloroplasts and mitochondria : Can the overall energy turnover of the biosphere be simply explained based on the metabolism of chloroplasts and mitochondria? Explain.
Why research is important for the field social work : Critically think about research, research ethics, and the social work code of ethics. Write a 3 page reflection on your thoughts and as it relates.
Cloning a particular segment of dna : You are interested in cloning a particular segment of DNA and wish to use a commercial cloning vector with a BamHI cloning site.
Discuss and agree on a thesis that you would like to present : Discuss and agree on a thesis that you would like to present - this is the statement which will form the basis of your argument.
Explain the functioning of security services : Explain the functioning of security services in computing environments and the security issues in mobile and loT computing
Hemoglobin good for oxygen transport : How this tetrameric association make the hemoglobin good for oxygen transport? What effects promote the release of oxygen where it is needed?
What you may have learned from the text : The purpose of a Reading Reflection Paper is understand your informed opinions about what you may have learned from the text.
Number of subunits present and molecular weight : Describe the native conformation of this protein in terms of the number of subunits present and their molecular weight.
Draw the two structural forms of the cm functional group : Draw the two structural forms of the CM functional group. (Hint: see second page). State the charge on the form which predominates at pH 7.0.

Reviews

len2016870

6/12/2018 5:19:16 AM

It is our new assignment of its infrastructure and security. Makes it an assignment, choose two topics and approximately 15 pages. You must cite using 'credible' references. These would include Review articles from well-known magazines (no more than 2 citations from the same article)

len2016870

6/12/2018 5:17:26 AM

Weight: 25% Due date: 28, 9am AEST Late penalty 10• per day after the deadline. In assignment 7, we gave some leniency towards 5 mins after deadline etc. We will NOT do this again for this assignment. Late penalties will be strictly. Aitgliett no exceptions. It is your responsibility to submit well in Advance of deadline in order to avoid network and other errors causing lateness.

len2016870

6/12/2018 5:16:45 AM

Length: up to 10 pages including refs and pictures/graphs, etc. Feedback mode: Feedback will be provided using inline marking tool and general comments. ** 3 people in a group may be allowed (if specifically requested). In this case, however, two broad topics will be required, and the page count of 15+ pages will be expected. In addition, the topics chosen must be such that it is instructive to see how security issues or considerations in one domain have affected design considerations in the other domains.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd