Tools and techniques for computer systems security

Assignment Help Computer Network Security
Reference no: EM132286119

Aim:

1. To implement the skills and knowledge gained through the course.

2. To achieve greater awareness of the latest security tools and techniques for computer systems security.

Word length for body of report: 3000-3500 words (excludes any appendices or references)

Instructions

Part A: Assignment tasks

You are to select any one scenario for your report in consultation with your tutor. Your report on the scenario should be between 3000 and 3500 words. The emphasis of the report should be related to computer systems security.

Scenario 3: Encrypting Messages

As a security consultant for Allnet Solutions you have been contacted regarding assisting them with a new project.Allnet Solutions has offices in several parts of New Zealand. Allnet Solutions have asked for your help. Create a report that lists different types of email cryptography security options that can be implemented, along with their advantages, disadvantages, and case of use. include those packages that work with Lotus Notes, Pegasus, Microsoft Outlook and Novell GroupWise. Rank the packages according to the criteria: are the easiest to use and have the most features.

1. Prepare a PowerPoint presentation summarizing your report for presentation in class

2. Be ready to discuss and demonstrate your case study findings in the class.

Presentation;
1. Report writing: Prepare a comprehensive report which incorporates results of investigation, discussion, implementation and analysis from previous steps. Your ability to correctly use terminologies, existing models, threat life cycle, attack steps and mitigations will be evaluated during our review. Organize your report for readability and integrity and create Appendices wherever appropriate.

2. Report should follow Unitcc's standard format (3000 - 3500 words, less than 20% quoted)
a. Title page
b. Table of contents
c. Abstract or ExecutiveSummary
d. Introduction
e. Methodology
f. Implementation
Detail discussion and analysis of chosen scenario
g. Summary and Recommendation
h. Impact of recommendation on Maori & Pacific communities.
i. Reflection
j. References (in IEEE style)
k. Presentation/Demo

3. Please use MS Word and print out a hard copy (in addition to a soft copy)

4. There will be additional quizzes during class time that may contribute to the above marking

Verified Expert

he following assignment is a report on the different email encryption techniques that can be used by a business organisation, which in this case is Allnet Solutions, a company in New Zealand. The first part of the paper assesses the options available for email security, and states the reasons and justifications of why they must be used. The report then goes on to explain, which tool should be implemented, with reasons for the same. A presentation/demo on the report has also been attached. The report has been prepared using Microsoft Office Word, while the presentation has been created with Microsoft PowerPoint.

Reference no: EM132286119

Questions Cloud

Comparing sales performance of various product lines : Comparing sales performance of various product lines between different types of countries, notices what appears to be a recurring anomaly.
Discuss about integration of built and natural systems : Building off your completed sketching assignments, if you found particular interest in any of them, could be a good place to start. And for some of you.
What is the implied discount rate in an annuity product : 1. What is the implied discount rate in an annuity product that costs $50,000 today and pays the owner twenty annual payments
Discuss nongovernmental actors : Discuss nongovernmental actors and how they interact with each branch of government throughout the policy process.
Tools and techniques for computer systems security : Prepare a comprehensive report which incorporates results of investigation, discussion, implementation and analysis - Organize your report for readability
Branch of government throughout the policy process : Discuss nongovernmental actors and how they interact with each branch of government throughout the policy process.
What is the preferred stock price per share : A share of a preferred stock pays a dividend of $0.41 annually. The required rate of return is 2%. What is the preferred stock's price per share?
Conduct pre-employment background investigations : Why is it important to conduct pre-employment background investigations? How would you go about doing so?
Compare the visual elements of cultural familiarity : Compare and contrast the visual elements of cultural familiarity. Explain why it is important to use culturally familiar visuals that are quite different.

Reviews

len2286119

4/17/2019 3:20:16 AM

Assignment Please read carefully Criteria on Report (40%) Your report will deserve an A grade when above requirements are met in full. Your reports will be marked on content, report style, and appropriate and correct English. While I will be concentrating on the quality and comprehensiveness of your report, weakness in one area will result in a B grade. Poor critiquing will receive a score no more than C grade.

len2286119

4/17/2019 3:19:34 AM

Marks will be deducted if you fail to draw upon appropriate professional and academic literature in your writing andiftheassignmentisnotwrittenand presented ina professional manner.Youcanquoteother people'swork(websites, conference proceedings. industry magazines, journals, and books) provided that you cite and reference them correctly in your report. However, mostof your reportshould be your own ideas and thoughtswritten inyour words. Each quotation ortable or diagram from another sourcemust be accompanied by a discussion in your own words. For example, if you have included a table from another source then you must writeabout what you think the tableshows.whyyou have included &why it is relevant and so on. Please remember to format your report so that it is easy to discern your thoughts and ideas from your sources' thoughts and ideas.

Write a Review

Computer Network Security Questions & Answers

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  Network security protocols

Explain several network security protocols and their similarities and differences. Evaluate a variety of network security and management tools.

  Research the issue of iot security and write a report

Research the issue of IoT security and write a report documenting your findings. Explain fundamental information security concepts;

  Prepare a paper on new approaches in cryptography

Prepare a paper on new approaches in cryptography - Cryptography of the Modern Era - This a 6-pages research paper, cite your sources and use apa citation

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  Design a network to incorporate connection to the internet

Oftentimes, the process of implementing security opens one's eyes to other forms of security not previously considered. Well, in this assignment you should.

  Discuss physical and logical vulnerabilities

A first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This list should be fairly exhaustive. Many vulnerability and threat pairs will not make the final cut for..

  Compare symmetric and asymmetric encryption algorithms

What is the value of TA ? What is the value of your shared secret key? Can you guess Bob's secret value SB and what it would be?

  Use the internet to research oauth

CP5603 - Advanced E-Security - improve your critical thinking and problem solving skills, as well as your information literacy skills

  Create class to maintain personal budget for a year

Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.

  Developing a cybersecurity strategy

Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation

  Write a ten page report for the cio of kudler fine foods

Write an 8-to 10-page report for the CIO of Kudler Fine Foods. The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd