What are the cryptographic techniques

Assignment Help Computer Engineering
Reference no: EM132293645 , Length: 250 Words

Assignment: Task: In this assessment task you are required to select a topic for your research project from the list of research areas/topics provided below:

• Biometrics for authentication: security and privacy implications

• Security and privacy issues in Internet of Things (IoT) /Smart Architectures

• Security threats in cloud computing and preventive methods

• Security issues in Software Defined Networks (SDN)

• Denial of service and distributed denial of service attacks

• Investigating security of Blockchain enabled applications

• Malware: past, present and future

• Employee privacy and email, WWW, and instant messaging

• Wireless Network security and preventive techniques

• Security threats related to BYOD devices and countermeasures

• Cryptographic techniques

• Data Exfiltration techniques

In this assessment, you are required to submit the title and an abstract for your selected research project. The abstract will provide an overview of your selected topic, along with key securtiy challenges in that area and why you have selected this to be your area of research. At the end of the submission, you should have "Reference" section that will have a maximum of two articles (at least one journal article) used to build your discussion for this abstract.

Rationale: This assessment task will assess the following learning outcome/s:

• be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

• be able to explain the fundamental concepts of cryptographic algorithms.

• be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.

• be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.

• be able to investigate and justify the use of the access control mechanisms and user authentication processes.

• be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

This assessment has been designed to assist students with the completion of assessment 5 (Research Project Report).The aim of this task is to help students :

• to build an understanding and perspective of current and emerging topics in Information Security;

• to help the students to formulate their research project in a step by step manner; and

• to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security

Requirements: In order to successfully write the abstract, it is highly recommended that the students search latest research articles preferably from well known and reputed research portals such as IEEE, ACM, Springer and Wiley etc. This will help you to develop an understanding of latest issues and any current research being undertaken in your selected research topic.

Please note: Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.

Reference no: EM132293645

Questions Cloud

Employees can contribute to global business : Please explain (a) who "multicultural employees" are, and (b) how multicultural employees can contribute to global business.
Undermine the integrity and accuracy of the property tax : Which of the following do not undermine the integrity and accuracy of the property tax?
Norm in many multinational organisations : Please (a) describe some key challenges that multicultural teams face, and (b) outline four strategies that organisations can pursue to better manage these team
Describe the differences between the bond ratings : In your own words and using various bond websites, please locate one of each of the following bond ratings: AAA, BBB, CCC, and D.
What are the cryptographic techniques : The abstract will provide an overview of your selected topic, along with key securtiy challenges in that area and why you have selected this to be your area.
Organizations take to recognize these instances : ow do you think we might be able to recognize when we are rewarding the wrong thing? What steps can organizations take to recognize these instances?
Examine emerging technologies in application software : Research the web and journal sites and identify one article that examines advances or emerging technologies in application software and their impact.
What organisations can do to avoid bamboo ceiling : Bamboo ceiling is a pressing concern in many western organisations. Please (a) explain what "Bamboo Ceiling" is, (b) outline the possible reasons for bamboo
Write an innovation strategy report : Describe how the creation of an innovation strategy ensures strategic alignment within organisations and why it is important

Reviews

Write a Review

Computer Engineering Questions & Answers

  Evaluate the threaded implementation of thesort algorithm

Evaluate the threaded implementation of thesort algorithm relative to data integrity and concurrency control. Is the threaded implementation correct, orare there data integrity concerns due to concurrency control?

  Accept n array of strings as a parameter and switches

Write a method named swapPairs that accepts an array of strings as a parameter and switches the order of values in a pairwise fashion.

  Create system requirements based on the scope of the project

Create 15 to 20 system requirements based on the scope of the project discussed in the requirements meeting. Ensure the requirements meet quality standards.

  Provide some command line parsing capability to extract

list the current directory contents, you will need to provide some command line parsing capability to extract the target directory for listing.

  How does the flow rate differ for these two passages

A particular heat exchanger is built of parallel plates, which serve to separate the two fluids, and parallel continuous fins, which extend between the plates.

  A perfect number is a number that is equal to the sum

The function returns true if the given number is a perfect number and false otherwise

  Create each method to perform the task its name implies

Write an application whose main() method holds two integer variables. Assign values to the variables.

  Write function that compares two words and prints all letter

Write a function that compares two words and prints all the letters that appear in both. Change the encode function so that spaces are simply skipped.

  Report on the number of times you get a list consisting

Using C++ write a code to solve the following problem using singly linked List. Start with an empty list. You will toss a coin.

  Show what threading model is used and why

Show what threading model is used and why?  How would an HTML serve listen and communicated with an HTML client?

  Compute the number of collisions required in a long random

Write a program to compute the number of collisions required in a long random sequence of insertions using linear probing, quadratic probing.

  Discussion about thr network security protections

Using your choice of hat color, in 750-1,250 words provide different hacking, security methods, and network security protections in the areas of cryptograph.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd