The goal of this assignment is to provide exposure to a

Assignment Help Computer Networking
Reference no: EM13371579

The goal of this assignment is to provide exposure to a typical network security problem. This is an individual assignment.

For the assignment, you are required to implement (or test) a security mechanism and write a report, or to write a research report based on an in-depth analysis (possibly with a case study).

The topic, may be of your interest, needs to be approved in advance by the course convenor Dr Xin-Wen Wu; other than that, there are no restrictions.

If you choose to complete a research report (not an implementation or a test of a security mechanism) for the assignment, the research report should be of at least 1500 words.

The exact marking scheme will depend on the type of project (e.g. level of implementation required/ non-implementation/ etc). However, the following may be used as some indication:

Possible Topics:

You can choose one of the following topics to complete the assignment:

- Developing an encryption/decryption demo (mainly for learning and teaching purposes)

- Developing a secure on-line micro-payment system

- Developing a simple biometric authentication model

- Developing firewall architecture for WLANs

- Developing security management framework for wireless networks

- Enhancing security in Internet banking

- Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)

- Multi-factor authentication and its applications

- Security in digital content distributing systems

- Digital copyright protection

- Privacy protection in electronic commerce

- Privacy and security issues in e-Health

- Protection of network-based systems against distributed denial-of-service attacks

- IPsec implementation issues in wireless networks

- Secure wireless routing

- Challenges and solutions for security in mobile ad-hoc networks

- Security in peer-to-peer networks

- Security in on-line network games

- IPv6 security issues

- Bluetooth security

- Digital watermarking and fingerprinting

Reference no: EM13371579

Questions Cloud

Collect sources that you will use to write your research : collect sources that you will use to write your research essay.citation mla stylethe annotated bibliography prepares
The importance of ethical leadership is a subject of : the importance of ethical leadership is a subject of interest in current management and leadership research. to some
Need help writing a one page proposal consisting of 300 : need help writing a one page proposal consisting of 300 words about informing people about the air pollution in china.
Write an essays on a guitarist of your choice weight it as : write an essays on a guitarist of your choice. weight it as followbiographydiscuss the style of music played e.g. jazz
The goal of this assignment is to provide exposure to a : the goal of this assignment is to provide exposure to a typical network security problem. this is an individual
Write a formal academic essaydiscuss the physical emotional : write a formal academic essaydiscuss the physical emotional cognitive and behavioural responses an individual is likely
National health issue paper breast cancer research and : national health issue paper breast cancer research and prepare a national health issue paper.- reason for choosing
During our stay in washington we saw and experienced a : during our stay in washington we saw and experienced a number of things that spoke to the larger lsquoamerican
Prepare a optical networks1- background about optical : prepare a optical networks1- background about optical network and how it is work.2- advantages and application for

Reviews

Write a Review

Computer Networking Questions & Answers

  Create subnet assignment which give contiguous address space

Provide subnet assignment which gives contiguous address space to each department. (b) Do same in (a) but with department B having 70 hosts.

  Define a new generation of wireless lan technology

In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN techno..

  Determine result of scrambling sequence using techniques

Determine the result of scrambling sequence 11100000000000 by using one of the following scrambling techniques? Suppose that last non-zero signal level has been positive.

  Determine nr count back from secondary after last frame

If poll bits are in the sixth frame, determine the N(R) count back from secondary after last frame? Suppose error-free operation.

  Discuss at least three major evolutionary steps

A. How does Donn Parker's model compare with the X.805 framework? B. If an organization consulted you about its decision on an enterprise security framework, which would you recommend and why?

  Weigh in on the debate between gsm and cdma

The first student to post will respond to the last student to post. In addition, you should comment on at least one other person's response.

  The analog to digital converter

The Analog to Digital converter has V(t) as its input, and it outputs a binary word B(t) with a fixed length of k bits, which is its best approximation to V(t). Suppose that V(t) can vary continuously between zero and 5 volts

  Explain move of ethernet from lan technology to man

Explain the move of Ethernet from LAN technology to MAN and Wan technology. Explain what has made this possible? Additionally, explain the social significance of this move.

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Operation of one-product vending machine using semaphores

Keep track of number of products keeping in machine and amount of money customer has inserted. Two processes are utilized, one which accepts money and keeps track of amount paid.

  Find the mean of the numbers in the array

Input a list of positive numbers (terminated by 0) into an array, find the mean (average) of the numbers in the array, and output the result. Use a subprogram to input the numbers, a function to find the mean, and a subprogram to output the resul..

  Impact of a particular trend in technology

Analyze the impact of a particular trend in technology on education and analyses of various authors on innovations and technological transformations in education and in other fields.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd