to build an understanding and perspective of curre

to build an understanding and perspective of current hot topics in Information Security

The primary theme of the paper is to build an understanding and perspective of current hot topics in Information Security in which you are required to emphasize its aspects in detail. The cost of the paper starts from $109 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.

Task

Below are listed a list of topics. You are required to -

Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions… etc.)

Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly. Raise questions about the information provided by other students (this must be done in an adequately professional manner)

Respond to questions raised about your own information and other student`s

 

Contribute to discussions in general

 

1.to build an understanding and perspective of current hot topics in Information Security; and 2. to build generic skills including, but not limited to:

 

a capacity for teamwork and collaboration;

an ability for critical thinking, analysis and problem solving; information technological literacy;

a capacity for lifelong learning and an appreciation of its necessity.

 

As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.

 

Topics Set

  1. US cryptography export restrictions: past, present, and future.
  2. Biometrics for authentication: security and privacy implications.
  3. Denial of service and distributed denial of service attacks.
  4. Malware: past, present and future.
  5. Employee privacy and email, WWW, and instant messaging.
  6. Security threats to mobile devices and countermeasures.
  7. Security threats in cloud computing and preventive methods.
  8. Security threats in smart devices.
  9. Data Exfiltration.
  10. Wireless Network security and preventive methods.
  1. Security issues in Software Defined Networks (SDN)
  1. Security and privacy issues in Internet of Things (IoT)

 

Your submission :

 

You are required to prepare and submit a report on your topic to address the following questions (the length of the report within 1500~2000 words, excluding references):

 

  1. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

 

  1. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.

 

  1. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.
  2. Discuss the impact of the above mentioned issues and their application/impact in real life.

 

  1. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.
  2. Provide references (at least three) using APA referencing system including in text citations.

Rationale

 

This assessment item relates to the learning objectives and to demonstrate your understanding of the material in different topics of your subject.

Its also provides an opportunity for you to :

demonstrate factual knowledge, understanding and application of state-of-art information security;

demonstrate ability to integrate and apply information from various topics and ; apply understanding and knowledge to a practical situation;

demonstrate ability to work in a team, sharing knowledge.

Marking criteria

Assessment criteria

 

 

 

 

Assessable

HD

DI

CR

PS

FL

Components

100% - 85%

84% - 75%

74% - 65%

64% - 50%

49% - 0

Provide your

Demonstrate an

Demonstrate an

Demonstrate an

Demonstrate an

Fails to

published research ability to survey

ability to survey

ability to survey

ability to

demonstrate

report on the

the literature,

the literature,

the literature,

survey the

the ability to

chosen topic with

concise

concise summary

concise summary

literature,

survey the

brief supportive

summary which

which are

which are

concise

literature,

descriptions about

are logically

logically

generally logically

summary which

concise

the challenges,

structured,

structured to

structured to

partially

summary

problems, relevant

integrate and

create cohesive

create a

structured into

which

technologies,

link information

and coherent

comprehensive,

loosely-linked

partially

applications of the

into cohesive

piece of analysis

mainly descriptive

rudimentary

structured

technologies,

and coherent

that consistently

piece of analysis.

sentences to

and may tend

clarify vague areas

piece of

use correct

Some use of

create a

to list

and research

analysis and

forensic

correct forensic

comprehensive,

information.

questions.

consistently use

terminologies.

terminologies.

descriptive

Uses frequent

(10)

correct to the

 

 

piece of

informal

 

selected topic

 

 

analysis. Some

language.

 

terminologies

 

 

use of correct

 

 

and

 

 

forensic

 

 

sophisticated

 

 

terminologies.

 

 

language.

 

 

 

 

Possible Marks

10.0 – 8.5

8.4 – 7.5

7.4 – 6.4

6.4 – 5

4.9 – 0

Summarise the

The DI criteria,

Summary of the

Summary of the

Summary of the

Fails to

issues discussed in plus:

literature (the

literature (the

literature (the

summarise

the forum (at least

Summary of the forum posting

forum posting

forum posting

the literature

two peers).

literature (the

above) is strongly above) strikes a

above) is

(the forum

Discuss how your

forum posting

student-centred or balance between

supported by

posting

own posts

above) also

reader-orientated,

being simple,

brief

above) and

contributed to this

exhibits

strikes a balance

informative and

descriptions,

feedback

knowledge and

significant

between being

engaging and is

how it fits

provided to

discuss whether or creativity and

simple,

supported by brief

within the

cohort

not the summary

innovation in

informative and

descriptions, how

topic. Feedback

colleagues is

presented by your

the way it

engaging and is

it fits within the

provided to two

inadequate/or

peers is accurate.

depicts and

supported by brief topic.

cohort

lacking

(10)

presents the

descriptions, how

Feedback

colleagues is

research.

 

design concept

it fits within the

provided to two

informed and

Uses frequent

 

and supportive

subject.

cohort colleagues

constructive

informal

 

information.

Feedback

is informed,

and feedback

language.

 

Feedback

provided to two

constructive and

received is

 

 

provided to two cohort colleagues

progressive and

reviewed with

 

 

cohort

is informed,

feedback received

changes made

 

 

colleagues

constructive and

is critically

to your report

 

 

offers in-depth

progressive and

reviewed with

accordingly.

 

 

insights and

feedback received changes made

 

 

 

relies strongly

is critically

supported through

 

 

 

prompts on

reviewed and

reliance on

 

 

 

broader

prompts a broader Information

 

 

 

examination of

examination of

security.

 

 

 

emerging trend

the issues raised

 

 

 

 

of Information

through reliance

 

 

 

 

security.

on information

 

 

 

 

 

security.

 

 

 

Possible Marks

10.0 – 8.5

8.4 – 7.5

7.4 – 6.4

6.4 – 5

4.9 – 0

 

 

 

 

 

 

 

 

 

 

 

Identify any

Comprehensive

Reasonable

Provided

Limited

Fails to

important issue/s

knowledge of

knowledge of the

factual/conceptual

knowledge of

satisfy

that you believe

the topic and in

topic and a

knowledge of the

the of the topic minimum

were not

depth

comprehensive

topic and an

and a basic

requirements

addressed, or not

explanation of

explanation of the

overall

explanation of

of explaining

addressed

the issues that

issues that were

explanation of the

the issues that

the issues.

adequately in the

were not

not addressed;

issues that were

were not

 

discussions.

addressed;

 

not addressed;

addressed;

 

Discuss why you

 

 

 

 

 

view this

 

 

 

 

 

issue/these issues

 

 

 

 

 

as important. (8)

 

 

 

 

 

Possible Marks

8.0 – 6.8

6.7 – 6.0

5.9 – 5.2

5.1 – 4.0

3.9 – 0

Discuss the impact Comprehensive

Reasonable

Provided

Limited

Fails to

of the above

knowledge of

knowledge of the factual/conceptual

knowledge of

satisfy

mentioned issues

the issues and

issues and real

knowledge of the

the issues and

minimum

and their

real life

life consequences issues and real life

real life

requirements

application/impact consequences to

to a firm.

consequences to a

consequences

of explaining

in real life. (8)

a firm.

 

firm.

to a firm.

the impact on

 

 

 

 

 

a firm.

Possible Marks

8.0 – 6.8

6.7 – 6.0

5.9 – 5.2

5.1 – 4.0

3.9 – 0

Reflect on what

The reflection is The reflection is a The reflection is a

The reflection

Fails to

you believe to be

an in-depth

reasonable

reasonable

attempts a basic

satisfy

the most important

analysis of the

analysis of the

analysis of the

analysis of the

minimum

lesson you have

learning

learning

learning

learning

requirements

learnt as a result of

experience, the

experience, the

experience, the

experience, but

of reflecting

these discussions.

value of the

value of the

some value of the

the value of the the important

(8)

derived learning

derived learning

derived learning to

derived

lessons.

 

to self and the

to self and the

self.

learning to self

 

 

enhancement of

enhancement of

 

is vague.

 

 

the student’s

the student’s

 

 

 

 

appreciation for

appreciation for

 

 

 

 

the issues

the issues

 

 

 

 

surrounding the

surrounding the

 

 

 

 

topic.

topic.

 

 

 

Possible Marks

8.0 – 6.8

6.7 – 6.0

5.9 – 5.2

5.1 – 4.0

3.9 – 0

Provide references

Faultless

Very good

Good referencing,

Evidence of

Sub-standard

(at least three)

referencing,

referencing,

including

rudimentary

referencing.

using APA

including

including

reference list and

referencing

Poor quality

referencing system

reference list

reference list and

in text citations.

skills.

references.

including in text

and in text

in text citations.

Good quality

Mix of good

 

citations. (6)

citations.

High quality

references.

and

 

 

High quality

references.

 

poor quality

 

 

references.

 

 

references.

 

Possible Marks

6.0 – 5.1

5.04 – 4.5

4.44 – 3.85

3.84 – 3.0

2.9 – 0

 

100% Plagiarism Free & Custom Written, Tailored to your instructions