Option 1 you can are required to research into one of the

Assignment Help Computer Networking
Reference no: EM13380360

Option 1:

You can are required to research into one of the following topics on data security or computer-network security and to write a report. The report should be of 1500 - 2000 words.

Topics to select from are:
- Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
- Multi-factor authentication and its applications
- Security in digital content distributing systems
- Digital copyright protection
- Privacy protection in electronic commerce
- Privacy and security issues in eHealth

- Access control and data integrity for hospital databases
- Protection of network-based systems against distributed denial-of-service attacks
- IPsec implementation issues in wireless networks
- Secure wireless routing
- Challenges and solutions for security in mobile ad-hoc networks
- Security in peer-to-peer networks
- Security in on-line network games
- IPv6 security issues

- Digital watermarking and fingerprinting

The report should provide an in-depth analysis of the topic based on your research. It is expected that: (1) The security theories, principles, and techniques covered by the subject are applied to your analysis; and (2) The report should include your research findings.

Please note that every student is welcome to choose this option. If you have completed a research report for your first assignment, you may select a new topic to do or continue your topic for the first assignment.

For those who choose to do research and to write reports for both assignments 1 and 2, please make sure that the two research reports are different in the following aspects.

(1) The second research report should include applications of the security theories, principles, and techniques of the subject.

(2) The second report should include your research findings (such as, improved security techniques, improved protocols, or new security techniques proposed by yourself).

(3) The two reports should not have 20% or more overlap (if you choose the same topic as the first assignment).

Option 2:

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:

(a). The simulator will have at least two servers: database server and web server.

(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.

(c). The office in Singapore cannot access the database.

(d). The office in Hong Kong cannot access the web services.

(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e).

Reference no: EM13380360

Questions Cloud

Primary task responsenbspwithin the discussion board area : primary task responsenbspwithin the discussion board area write 400-600 words that respond to the following questions
As the lead software engineer for a medium-sized hospital : as the lead software engineer for a medium-sized hospital you have been asked to spearhead an effort to improve the
1 write an application class that contains several : 1 write an application class that contains several methods.nbspthe first method should be named greeting and should
1 the appropriate sql statements for each query which : 1. the appropriate sql statements for each query which should be copied from your sql code in mysql and pasted into
Option 1 you can are required to research into one of the : option 1 you can are required to research into one of the following topics on data security or computer-network
You will need to design an interface to a systemyou will : you will need to design an interface to a system.you will need to justify every item that you choose to put into this
Assessment taskyour task is to develop a java application : assessment taskyour task is to develop a java application that allows the user to read travel booking data from a text
What does the abstract keyword dowhat are generics as they : what does the abstract keyword do?what are generics as they relate to the built in linked list class? why do we need
One of your smaller customers needs your help writing a : one of your smaller customers needs your help writing a program. your customer has an e-commerce web site but wants to

Reviews

Write a Review

Computer Networking Questions & Answers

  Analyse four security procedures that are recommended to

analyse four security procedures that are recommended to protect computer software from corruption and

  Write a plan like digital evidence for investigation

You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report.

  Global finance inc gfi is a financial company that manages

global finance inc. gfi is a financial company that manages thousands of accounts across canada the united states and

  What is the formula to calculate c/i

How is the interference problem identified in problem 1 usually solved? Explain how you know if the solution is adequate to fix the problem caused by the interference.

  Determine average streaming media data rate

Assume we can accurately forecast set of WAPs that the taxi will visit. Determine average streaming media data rate that we can sustain by downloading prefetched data from WAPs?

  Research on aspects of network administration and support

Peer-to-Peer, Client/Server and Virtualization platforms can be used to setup networks for organizations small in size. Compare the three mentioned platforms and mention their associated merits in relation to administration, security and usability

  Explain system enforces both blp and biba properties

Integrity SL = security clearance for level L = integrity clearance for level L SC = security category set for cat. C = integrity category set for cat C. Prove that in this system subject can only read and write at his own level.

  Describe the security features available on a platform of

? describe the security features available on a platform of your choice for example linuxandroidmac os

  Crack encryption key using brute force attack

Was Charlie exaggerating when he gave Peter an estimate for the time that would be required to crack the encryption key using a brute force attack?

  Select the hardware and software components to build the lan

Select the hardware and software components to build the LAN. Make sure you do not select two different components to perform the same function.

  What are the two limitations of static packet filtering

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd