Reference no: EM132846215
MITS5004 IT Security - Victorian Institute of Technology
Assignment 2 - Research Study
For this component you will write a report or critique on the paper you chose from Assignment 1.
• Encryption Techniques
• System and Network Security
• Digital Forensics
• Cloud and loT Security
• Application Security
• Data Security
• Threats, attacks and malware
• Social Engineering and phishing attacks
• Ethical Implications in Wireless Networks
• Information Security Management and Risk Assessment
The paper you select must be directly relevant to one of the above topics or another topic and be related to IT Security. The paper must be related to what we are studying this semester in IT Security. The paper can be from any academic conference or other relevant Journal and should be published in 2015 and later.
Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises. Citation of sources is mandatory and must be in the IEEE style.
Your report or critique must include:
Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID.
Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs).
Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study.
Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new' material that was not discussed in the body of the paper. (One or two paragraphs)
References: A list of sources used in your text. They should be listed alphabetically by (first) author's family name. Follow the IEEE style.
Calculate what is Avery WACC
: The interest rate on new debt is 6.50%, the yield on the preferred is 6.00%, Calculate what is Avery WACC
|
Describe sandra feelings about dependency
: Describe Sandra's feelings about dependency and loss of autonomy because she is unable to do her own activities of daily living any longer
|
What is McDurham degree of operating leverage
: McDurham's tax rate is 35 percent. What is McDurham's degree of operating leverage at a sales level of $400 million
|
Explain signs and symptoms for pharmacological treatment
: Explain signs and symptoms for your diagnosis, pharmacological treatments, nonpharmacological treatments, and appropriate community resources and referrals.
|
MITS5004 IT Security Assignment
: MITS5004 IT Security Assignment Help and Solution, Victorian Institute of Technology - Assessment Writing Service - write a report or critique on the paper
|
Identify key stakeholders who will support the change
: Identify the stakeholders who have some form of stake or interest in the project outcomes. Identify key stakeholders who will support the change.
|
Calculate the earnings before interest and taxes
: Given - Total revenue is $827,500, Cost of goods sold is $611,800. From the data above calculate the earnings before interest and taxes (EBIT)
|
What is the total amount of self employed income
: Question - If net profit is $100,000 and there is $10,000 for section 1231 gain. What is the total amount of self employed income
|
What does the term psychology mean
: As we begin our course, what does the term "psychology" mean to you? What is your first thought when you hear the term "Psychology?"
|