Research project (Abstract) Value: 5% Due Date: 31-Aug-2018 Return Date: Not returned Length: XXXXXXXXXXwords (Excluding references) Submission method options: Alternative submission method Task back...

1 answer below »

Research project (Abstract)


Value:5%Due Date:31-Aug-2018Return Date:Not returnedLength:200-250 words (Excluding references)Submission method options:Alternative submission method

Task



back to top


In this assessment task you are required to select a topic for your research project from the list of research areas/topics provided below:



  • Quantum cryptography

  • Evolution of malware

  • Internet of Things (IoT) /Smart Architectures: Security and privacy issues and solutions

  • Biometric authentication

  • Cloud computing security: Challenges and solutions

  • Security issues in Software Defined Networks (SDN)

  • Intrusion detection and prevention systems

  • Dark web

  • Investigating security of Blockchain enabled applications

  • Cyber warfare

  • Wireless Network security

  • BYOD security

  • Data Exfiltration techniques

  • Big data security and privacy issues and solutions

In this assessment, you are required to submit the title and an abstract for your selected research project. Your abstract should briefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important.


At the end of the submission, you should include a “Reference” section that will have a minimum of two articles (at least one journal article) used to build your discussion for this abstract. However, do not cite references within the body of the abstract.

Rationale



back to top


This assessment task will assess the following learning outcome/s:



  • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

  • be able to explain the fundamental concepts of cryptographic algorithms.

  • be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.

  • be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.

  • be able to investigate and justify the use of the access control mechanisms and user authentication processes.

  • be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.


This assessment has been designed to assist students with the completion ofAssessment 5(Research Project Report). The aim of this task is to help students :



  • to build an understanding and perspective of current and emerging topics in Information Security;

  • to help the students to formulate their research project in a step by step manner; and

  • to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security


Marking criteria and standards



back to top


The feedback for this assessment will be returned at the same time asAssessment 5.






















Assessable Components



HD


100% - 85%



DI


84% - 75%



CR


74% - 65%



PS


64% - 50%



FL


49% - 0



Abstract section


(5 Marks)



A very concise abstract where the aim of study is perfectly articulated, the central question is precisely formulated,



A concise abstract where the aim of study is appropriately articulated, the research question is formulated.



A concise abstract where the aim of study is relatively articulated, the research question is adequately formulated.



A concise abstract where the aim of study is articulated, the research question is vaguely formulated.



Incomplete abstract with no research question identified.











Presentation



back to top


The final submission must be in MS Word format. Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or not referenced). The abstract should not contain any undefined abbreviations or unspecified references.

You may find the tips on writing an abstract in the following link useful:

https://authorservices.taylorandfrancis.com/abstracts-and-titles/



The APA referencing style must be used throughout the document, with the reference list appearing at the end of the document. In-text citations should also follow the APA style. The APA referencing guide can be accessed via the following link:

http://student.csu.edu.au/study/referencing-at-csu


Requirements



back to top


In order to successfully write the abstract, it is highly recommended that you search latest research articles preferably from well-known and reputed research portals such as IEEE, ACM, Springer and Science Direct etc. This will help you to develop an understanding of latest issues and any current research being undertaken in your selected research topic.

Please note:
Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not
submit *.zip or *.rar or multiple files. Assessments may be marked and feedback may be generated using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.


A cover page must be includedand should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).

Assessment item

Answered Same DayAug 28, 2020ITC595Charles Sturt University

Answer To: Research project (Abstract) Value: 5% Due Date: 31-Aug-2018 Return Date: Not returned Length:...

Amit answered on Aug 30 2020
130 Votes
Full Name :
    
    Student ID :
    
    Subject :
    
    Assignment No :
    
    Due Date :
    
    Lecturer
’s Name :
    
Security issues in Software Defined Networks (SDN)
Your Name:
Your Email:
College name, University name, Country name
Table of Contents
1.    Abstract    3
2.    References:    4
1. Abstract
The networking method in which data planes and controls required for network are decoupled is known as SDN (Software defined network). The provided flexibility is main advantage of using SDN over other conventional networks. In a logical manner, the centralization of states and network intelligence is conducted for application abstraction in network...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here