Emerging threats related to use of networks, Computer Network Security

Assignment Help:

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment. 

Note:  before commencing research on the topic, you must seek approval from your tutor or, if you are a FLEX student, the course coordinator.

Research report topic:

The second assignment requires that you address the following topic:

Considering all current, foreseeable and emerging threats related to use

of networks, provision of services and data security, discuss what you believe is the greatest security-related threat toone of the following:

civil freedom,

governments or to

business and the economy.

In responding, you should provide a brief history of the threat or issue, argument for its importance and discussion of relevant Australian and/or International law, controls, countermeasures or circumvention mechanisms.

Examples of topics you may wish to consider are:

Wikileaks

Great Firewall of China

Australian Internet Content Filter

Cybercrime

Cyber terrorism

Identity Theft

The report in the second assignment will be 5000 - 7500 words (including references)

Proposal Requirements:

For this question, you must develop a proposal for a topic for the second assignment.  Your proposal should be no more than 1500 words(including references), clearly describe the topic and articulate why it is important.  You should briefly discuss the key issues you will be discussing in your report and give a broad outline of the report structure.

Your proposal should contain a brief but focused literature review, examining relevant industry and academic sources.  The literature review needs to be directly linked to your topic and the issues you intend discussing in your report.  You need to be clear about explaining why the points made in the literature are relevant to your assignment.  Inclusion of generalised security-related literature or literature that lacks relevance will lead to low marks.

It is suggested that you gather at least 5 - 10 key pieces of literature for this stage of the report:  you will almost certainly use more in order to complete assignment 2.  Note:  it is better to have a smaller number of well-analysed pieces of literature than a larger number of irrelevant or generalised references.


Related Discussions:- Emerging threats related to use of networks

Digital certificates-cryptography, Digital Certificates Digital Certific...

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

Derive the transmitted crc header checksum, QUESTION (a) Consider the f...

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th

Netfilter firewall, Netfilter Firewall Netfilter is the popular name f...

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

Transmision imparment, What are Transmission Impairments? Explain the follo...

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

Wfabilling project in java, WFABilling project in Java:  Project Title...

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Benchmarking-information security, Benchmarking An alternative approach to...

Benchmarking An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization de

Routing protocol for a banking network, You have been asked to design a Ban...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Identified issues in networks, The "Big Red Rocks" (BRR) mining company is ...

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Describe privacy-protecting techniques, Question: a) What do you meant...

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

Explain the term quality of service in networks, QUESTION (a) One of th...

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd