Technical report on a network security topic

Assignment Help Computer Network Security
Reference no: EM131265450 , Length: word count:1000

Instructions:

You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecturer in Week 3/4.

You will be required to search relevant educational databases using Proquest, ERIC or others from your library for a minimum of two recent (>2013) refereed academic papers on your topic. Based on your research you will use relevant literature and published papers to write a technical report (minimum two pages for the body or "core text of the report) on your topic. The report should be to your tutor. You will need to give an overview on the papers themselves (reliability, choice of methodology etc. - a literature review) to set the context of the topic and then report on your conclusions.

You are required to:

- Undertake a literature review of a topic - refer to the following

- https://www.adelaide.edu.au/writingcentre/leaming_guides/leamingGuide writingLiteratureReview.pdf

- https://www.monash.edu.au/Ils/lIonline/writing/general/lit-reviews/index.xml

- https://www.monash.edu.au/Ils/lIonline/writing/science/lit-review/index.xml

- Deliver a presentation - approximately 15 minutes with a 5 minute question time

- Submit your presentation materials (slides, handouts and any other material used).

- Submit a two page report in a technical report format (in pdf format, NOT zipped using your own words), with valid references

- Two pages is the 'text body" of the report - -1000 words ... there will of course be a number of other pages - see the report format below.

- One sentence contains an average of eleven words and one A4 sheet contains an average of between 32 to 35 sentences. Therefore an A4 sheet has an average of 350 to 400 words. However, this does apply to a relatively full A4 sheet with a standard layout and one that is filled with text to around 80-90% of its capacity.

- Your report must demonstrate in-depth academic research by including appropriate references from the Networking related Journals.

- Refer to https://www.monash.edu.au/Ils/lIonline/writing/engineering/technical-report/index.xml for a good format for technical reports.

- Referencing must be in WA format both for in-text and end-text references.

- The report must be submitted via eCampus

- The report must be handed in by the due date or a penalty will be applied (-5% per day late, marked as 0% after 5 days - see section on "Extensions for Submission Dates")

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - that is, it does not cover a network security topic, is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

- Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment - tha does not cover a network security tonic. is not a literature review or has very poor referencing.

- The report will be marked at zero percent if it is not a literature review.

Reference no: EM131265450

Questions Cloud

Terminology from the background materials : In preparation for the SLP, make sure you have a thorough grasp of the terminology from the background materials including the main individual and organizational factors that lead to political behavior and the types of political behavior. Once you..
Process of procuring the drug : In hospitals, errors are common during all steps of the medication-use process and the process of procuring the drug, prescribing, dispensing, administering, and monitoring the patient's response.
How public policies and other less formal responses working : What is the problem? Be sure to narrow your problem enough to allow a focused examination. What are the individual and social implications of this problem? Discussion of implications should be supported by accurate research data. What do the expert..
Locate four empirical studies that research change : Locate four empirical studies that research change. Give the APA-formatted citation and add the studies to your RefWorks list. What are the primary methodologies used in the four studies that you read?
Technical report on a network security topic : You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecture..
Discuss a job interview : Discuss a job interview you had at some point. Do you believe the interviewer asked appropriate questions based on the recommendations you have learned in this course?
Explain the information the cio requested in the scenario : Develop a 5- to 7-slide Microsoft PowerPoint slide presentation that includes the information the CIO requested in the scenario.
Select four graphics from newspapers or magazines : Select four graphics from newspapers or magazines. - Critique each graphic based on what you have learned. - What is correctly shown?
Define the various methodologies for sociological research : Define the basic concepts used in the discipline of sociology. Define the various methodologies for sociological research. Use technology and information resources to research issues in sociology.

Reviews

len1265450

11/4/2016 3:18:39 AM

Marking criteria for presentationOn Topic content/explanation 20 On time 10 Use of up-to-date relevant examples 20 Presentation techniques 5 Presentation (PPT) format 5 Conclusion 5 References (choice of/quality) 15 In-depth knowledge of topic 10 Report / resources used 10 Total Marks 100 Note: the resentation will receive zero marks if it does not address the aim of bein. a iresentation of our literature review

len1265450

11/4/2016 3:18:22 AM

• Note: The lecturer reserves the right change the marking schedule of the presentation and/or report if the submission fails to address the aims of the assessment — tha does not cover a network security tonic. is not a literature review or has very poor referencing. • The report will be marked at zero percent if it is not a literature review.

Write a Review

Computer Network Security Questions & Answers

  Explain what the control helps mitigate in a scada system

Select one control, identify whether the control falls under Management, Operational or Technical Controls and explain what this control helps mitigate in a SCADA system?

  What changes to the network topology or design must be made

After running for several months with a single router and a single Internet Service Provider, Netstack College wants to improve the reliability of their Internet connection. They have contracted with a second ISP so they will have two connections ..

  Operations of an atm machine

Simulate the operations of an ATM machine. First, the customer is prompted to enter his personal identification number pin (for this case study, we test only if this pin is formed by 4 digits, otherwise a message like "Invalid PIN, try again..." w..

  Experience developing web pages or web sites

A non-profit organization would like you to lead a Web site development project for them. The organization has Internet access that includes space on a Web server, but has no experience developing Web pages or Web sites.

  Discuss your experience working with labsim

Discuss your experience working with LabSim and completing Unit 1 Lab tasks in Part I. Of the three Sections chosen in LabSim Module 3, share your thoughts about one of the simulated labs that you completed.

  Forensic challenge in mobile network

As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..

  Give opinion of most important ways that believe encryption

Give your opinion of the two most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer.

  Design effective organization cybersecurity standards

Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer.

  Analyze the impact of security breaches

1. you need to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once you select a particular security breach to work on, other students cannot ..

  Research the possible ways of creating such a cctv system

MN603 Wireless Networks and Security Assignment. Research the possible ways of creating such a CCTV system for the above Case study to help Raju out. Which way would be the best possible approach. Justify your answer

  Analyze the emerging security threats presented

Analyze the emerging security threats presented within the "Security Threat Report 2014" report. Analyze the major threats to mobile devices, and suggest at least two methods to mitigate the concerns.

  Is this how a 33,600 bps modem operates

If a telephone line can carry a signal with a baud rate of 6000 and we want to transmit data at 33,600bps,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd