Identify and analyse the attack with highest criticality

Assignment Help Management Information Sys
Reference no: EM132103160 , Length: 1800 Words

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:

a. Compare standards-based technologies used in various networks;

b. Test and evaluate various wireless networks performance;

Assignment Description:

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks.

The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1].

The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

References

[1] L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

Reference no: EM132103160

Questions Cloud

Discuss why organizations are moving to the cloud : Explain why information silos are a problem for organizations. Discuss why organizations are moving to the cloud.
The different role of networking-network operating system : HS1011 : Demonstrate a basic understanding of terminology of network communications technology, network operating systems and network applications .
Calculate the current value of each farmers bank unsecured : Calculate the current value of each Farmers Bank unsecured note - How much can he consume in late-September, 2018 if the capital market offers an interest rate
How many attendees per seminar are required to generate : What is the impact on net profit of increasing the market-ing expense per seminar to $350, which increases average attendance per seminar to 50?
Identify and analyse the attack with highest criticality : Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.
Creating a program for a pizza shop : ITECH5403 – Comparative Programming Languages - creating a program for a pizza shop - however, as this is a comparative languages course, you will be creating
Identify and describe three types of computer storage system : Compare and contrast the varying filing systems (one-two slides), Identify and describe three types of computer storage systems (one slide),
Create a reference document demonstrating appropriate secure : Your company encourages its employees to interact with the corporate Facebook page as a way to promote brand awareness and customer engagement.
Demonstrate knowledge by writing a grant application : PUBH611 HEALTH PROMOTION - GRANTAPPLICATION - demonstrate knowledge by writing a grant application to extend an existing health promotion program

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd