Emerging threats related to use of networks, Computer Network Security

Assignment Help:

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment. 

Note:  before commencing research on the topic, you must seek approval from your tutor or, if you are a FLEX student, the course coordinator.

Research report topic:

The second assignment requires that you address the following topic:

Considering all current, foreseeable and emerging threats related to use

of networks, provision of services and data security, discuss what you believe is the greatest security-related threat toone of the following:

civil freedom,

governments or to

business and the economy.

In responding, you should provide a brief history of the threat or issue, argument for its importance and discussion of relevant Australian and/or International law, controls, countermeasures or circumvention mechanisms.

Examples of topics you may wish to consider are:

Wikileaks

Great Firewall of China

Australian Internet Content Filter

Cybercrime

Cyber terrorism

Identity Theft

The report in the second assignment will be 5000 - 7500 words (including references)

Proposal Requirements:

For this question, you must develop a proposal for a topic for the second assignment.  Your proposal should be no more than 1500 words(including references), clearly describe the topic and articulate why it is important.  You should briefly discuss the key issues you will be discussing in your report and give a broad outline of the report structure.

Your proposal should contain a brief but focused literature review, examining relevant industry and academic sources.  The literature review needs to be directly linked to your topic and the issues you intend discussing in your report.  You need to be clear about explaining why the points made in the literature are relevant to your assignment.  Inclusion of generalised security-related literature or literature that lacks relevance will lead to low marks.

It is suggested that you gather at least 5 - 10 key pieces of literature for this stage of the report:  you will almost certainly use more in order to complete assignment 2.  Note:  it is better to have a smaller number of well-analysed pieces of literature than a larger number of irrelevant or generalised references.


Related Discussions:- Emerging threats related to use of networks

Develop firewall rules, Question requires you to develop firewall rules bas...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Network security, Network security has become much more complex than ever b...

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Security policies, implementing password policy in organisation

implementing password policy in organisation

Security clearances-information security, Security Clearances For a secu...

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

Understanding a business model of a spammer, The first and foremost need of...

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

What is the major security flaw of set, QUESTION (a) Discuss why it is ...

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Difference between a class profile and a child profile sheet, QUESTION ...

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Illustrate about tinysec protocol, Illustrate about TinySec Protocol T...

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Miss, You are an IT Security administrator in a banking organization. Your ...

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

Technology, how can you enter the ASVAB practice test on line?

how can you enter the ASVAB practice test on line?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd