Assignment 2 - Research Study - 10% (Due Session 9) Individual Assignment For this component you will write a report or critique on the paper you chose from Assignment 1. Your report should be limited...

1 answer below »

Assignment 2 - Research Study - 10% (Due Session 9) Individual Assignment


For this component you will write a report or critique on the paper you chose from Assignment 1.


Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises. Citation of sources is mandatory and must be in the IEEE style.


Your report or critique must include:


Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID.


Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs).


Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study.




Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new’ material that was not discussed in the body of the paper. (One or two paragraphs)


References: A list of sources used in your text. They should be listed alphabetically by (first) author’s family name. Follow the IEEE style.

Answered Same DayOct 17, 2021

Answer To: Assignment 2 - Research Study - 10% (Due Session 9) Individual Assignment For this component you...

Hartirath answered on Oct 18 2021
135 Votes
Malware Attacks
Malware Attacks
Title:
Student Name:
Student ID:
Unit Name:
University Name:
Date:
Contents
Introduction    3
Body    4
Conclusion    5
References    7
Introduction
Mobile malware and defense systems: a comparative study of Abdullah A. Al-khatib and Waleed A
. Hammood.
The new and disruptive technologies used to ensure the security of smartphones are very limited as well as widely dispersed. The available options and gaps in this research area must be analyzed to provide valuable insights into the current technological environment. Due to the tremendous development of new mobile technologies, smart phones provide users with news functions. The most impressive features for users to be able to access online stores as well as install various applications. However, some applications have been written by malicious software for malicious use to carry out different types of attacks on user information in the form of lunch. Therefore, this research focuses on summarizing different types of mobile malware by highlighting the advantages and disadvantages of different types of malware. In addition, it summarizes the recently proposed framework to protect smartphones from malware attacks. The use of smartphones is growing exponentially, as well as we rising rely on smartphones to perform operations that were once only performed by computers, such as accessing online data, making payments, using utilities, as well as playing games. In addition to storing personal information such as contact data in the text messages, address book, or business data, the above operations are also the same. First, this report describes the intent and content of this article as well as the results of the survey. This study discusses the issues highlighted by the author. Reporting the results of the discussion and discussing the conclusions of the article, moreover how they relate to the subject of this research unit are also included in this research.
Body
The rapid or fast development as well as the growth of technology, especially in the field of networking, has completely changed the way of communication. Moreover, creating, storing, sharing, and managing information becomes easy, simple as well as fast. Like the other side of the coin, these advances have unfortunately opened the door to information gaps. Today, the enemy has begun to use network-oriented warfare in mobile malware applications. The information infrastructure has sadly become the target of malware writers. Hacking attacks have become more and more radical, and mobile users have been victimized and destroyed. Today, mobile technology is a set of interconnected information sources that enable users to interact with the market to access online markets, banking, as well as...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here