to build an understanding and perspective of current hot topics in Information Security
The primary theme of the paper is to build an understanding and perspective of current hot topics in Information Security in which you are required to emphasize its aspects in detail. The cost of the paper starts from $109 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.
Task
Below are listed a list of topics. You are required to -
Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions… etc.)
Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly. Raise questions about the information provided by other students (this must be done in an adequately professional manner)
Respond to questions raised about your own information and other student`s
Contribute to discussions in general
1.to build an understanding and perspective of current hot topics in Information Security; and 2. to build generic skills including, but not limited to:
a capacity for teamwork and collaboration;
an ability for critical thinking, analysis and problem solving; information technological literacy;
a capacity for lifelong learning and an appreciation of its necessity.
As such, the more you contribute in the development of these topics and related discussion the more likely you will score well in this task.
Topics Set
- US cryptography export restrictions: past, present, and future.
- Biometrics for authentication: security and privacy implications.
- Denial of service and distributed denial of service attacks.
- Malware: past, present and future.
- Employee privacy and email, WWW, and instant messaging.
- Security threats to mobile devices and countermeasures.
- Security threats in cloud computing and preventive methods.
- Security threats in smart devices.
- Data Exfiltration.
- Wireless Network security and preventive methods.
- Security issues in Software Defined Networks (SDN)
- Security and privacy issues in Internet of Things (IoT)
Your submission :
You are required to prepare and submit a report on your topic to address the following questions (the length of the report within 1500~2000 words, excluding references):
- Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.
- Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.
- Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.
- Discuss the impact of the above mentioned issues and their application/impact in real life.
- Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.
- Provide references (at least three) using APA referencing system including in text citations.
Rationale
This assessment item relates to the learning objectives and to demonstrate your understanding of the material in different topics of your subject.
Its also provides an opportunity for you to :
demonstrate factual knowledge, understanding and application of state-of-art information security;
demonstrate ability to integrate and apply information from various topics and ; apply understanding and knowledge to a practical situation;
demonstrate ability to work in a team, sharing knowledge.
Marking criteria
Assessment criteria
|
|
|
|
|
Assessable
|
HD
|
DI
|
CR
|
PS
|
FL
|
Components
|
100% - 85%
|
84% - 75%
|
74% - 65%
|
64% - 50%
|
49% - 0
|
Provide your
|
Demonstrate an
|
Demonstrate an
|
Demonstrate an
|
Demonstrate an
|
Fails to
|
published research ability to survey
|
ability to survey
|
ability to survey
|
ability to
|
demonstrate
|
report on the
|
the literature,
|
the literature,
|
the literature,
|
survey the
|
the ability to
|
chosen topic with
|
concise
|
concise summary
|
concise summary
|
literature,
|
survey the
|
brief supportive
|
summary which
|
which are
|
which are
|
concise
|
literature,
|
descriptions about
|
are logically
|
logically
|
generally logically
|
summary which
|
concise
|
the challenges,
|
structured,
|
structured to
|
structured to
|
partially
|
summary
|
problems, relevant
|
integrate and
|
create cohesive
|
create a
|
structured into
|
which
|
technologies,
|
link information
|
and coherent
|
comprehensive,
|
loosely-linked
|
partially
|
applications of the
|
into cohesive
|
piece of analysis
|
mainly descriptive
|
rudimentary
|
structured
|
technologies,
|
and coherent
|
that consistently
|
piece of analysis.
|
sentences to
|
and may tend
|
clarify vague areas
|
piece of
|
use correct
|
Some use of
|
create a
|
to list
|
and research
|
analysis and
|
forensic
|
correct forensic
|
comprehensive,
|
information.
|
questions.
|
consistently use
|
terminologies.
|
terminologies.
|
descriptive
|
Uses frequent
|
(10)
|
correct to the
|
|
|
piece of
|
informal
|
|
selected topic
|
|
|
analysis. Some
|
language.
|
|
terminologies
|
|
|
use of correct
|
|
|
and
|
|
|
forensic
|
|
|
sophisticated
|
|
|
terminologies.
|
|
|
language.
|
|
|
|
|
Possible Marks
|
10.0 – 8.5
|
8.4 – 7.5
|
7.4 – 6.4
|
6.4 – 5
|
4.9 – 0
|
Summarise the
|
The DI criteria,
|
Summary of the
|
Summary of the
|
Summary of the
|
Fails to
|
issues discussed in plus:
|
literature (the
|
literature (the
|
literature (the
|
summarise
|
the forum (at least
|
Summary of the forum posting
|
forum posting
|
forum posting
|
the literature
|
two peers).
|
literature (the
|
above) is strongly above) strikes a
|
above) is
|
(the forum
|
Discuss how your
|
forum posting
|
student-centred or balance between
|
supported by
|
posting
|
own posts
|
above) also
|
reader-orientated,
|
being simple,
|
brief
|
above) and
|
contributed to this
|
exhibits
|
strikes a balance
|
informative and
|
descriptions,
|
feedback
|
knowledge and
|
significant
|
between being
|
engaging and is
|
how it fits
|
provided to
|
discuss whether or creativity and
|
simple,
|
supported by brief
|
within the
|
cohort
|
not the summary
|
innovation in
|
informative and
|
descriptions, how
|
topic. Feedback
|
colleagues is
|
presented by your
|
the way it
|
engaging and is
|
it fits within the
|
provided to two
|
inadequate/or
|
peers is accurate.
|
depicts and
|
supported by brief topic.
|
cohort
|
lacking
|
(10)
|
presents the
|
descriptions, how
|
Feedback
|
colleagues is
|
research.
|
|
design concept
|
it fits within the
|
provided to two
|
informed and
|
Uses frequent
|
|
and supportive
|
subject.
|
cohort colleagues
|
constructive
|
informal
|
|
information.
|
Feedback
|
is informed,
|
and feedback
|
language.
|
|
Feedback
|
provided to two
|
constructive and
|
received is
|
|
|
provided to two cohort colleagues
|
progressive and
|
reviewed with
|
|
|
cohort
|
is informed,
|
feedback received
|
changes made
|
|
|
colleagues
|
constructive and
|
is critically
|
to your report
|
|
|
offers in-depth
|
progressive and
|
reviewed with
|
accordingly.
|
|
|
insights and
|
feedback received changes made
|
|
|
|
relies strongly
|
is critically
|
supported through
|
|
|
|
prompts on
|
reviewed and
|
reliance on
|
|
|
|
broader
|
prompts a broader Information
|
|
|
|
examination of
|
examination of
|
security.
|
|
|
|
emerging trend
|
the issues raised
|
|
|
|
|
of Information
|
through reliance
|
|
|
|
|
security.
|
on information
|
|
|
|
|
|
security.
|
|
|
|
Possible Marks
|
10.0 – 8.5
|
8.4 – 7.5
|
7.4 – 6.4
|
6.4 – 5
|
4.9 – 0
|
|
|
|
|
|
|
|
|
|
|
Identify any
|
Comprehensive
|
Reasonable
|
Provided
|
Limited
|
Fails to
|
important issue/s
|
knowledge of
|
knowledge of the
|
factual/conceptual
|
knowledge of
|
satisfy
|
that you believe
|
the topic and in
|
topic and a
|
knowledge of the
|
the of the topic minimum
|
were not
|
depth
|
comprehensive
|
topic and an
|
and a basic
|
requirements
|
addressed, or not
|
explanation of
|
explanation of the
|
overall
|
explanation of
|
of explaining
|
addressed
|
the issues that
|
issues that were
|
explanation of the
|
the issues that
|
the issues.
|
adequately in the
|
were not
|
not addressed;
|
issues that were
|
were not
|
|
discussions.
|
addressed;
|
|
not addressed;
|
addressed;
|
|
Discuss why you
|
|
|
|
|
|
view this
|
|
|
|
|
|
issue/these issues
|
|
|
|
|
|
as important. (8)
|
|
|
|
|
|
Possible Marks
|
8.0 – 6.8
|
6.7 – 6.0
|
5.9 – 5.2
|
5.1 – 4.0
|
3.9 – 0
|
Discuss the impact Comprehensive
|
Reasonable
|
Provided
|
Limited
|
Fails to
|
of the above
|
knowledge of
|
knowledge of the factual/conceptual
|
knowledge of
|
satisfy
|
mentioned issues
|
the issues and
|
issues and real
|
knowledge of the
|
the issues and
|
minimum
|
and their
|
real life
|
life consequences issues and real life
|
real life
|
requirements
|
application/impact consequences to
|
to a firm.
|
consequences to a
|
consequences
|
of explaining
|
in real life. (8)
|
a firm.
|
|
firm.
|
to a firm.
|
the impact on
|
|
|
|
|
|
a firm.
|
Possible Marks
|
8.0 – 6.8
|
6.7 – 6.0
|
5.9 – 5.2
|
5.1 – 4.0
|
3.9 – 0
|
Reflect on what
|
The reflection is The reflection is a The reflection is a
|
The reflection
|
Fails to
|
you believe to be
|
an in-depth
|
reasonable
|
reasonable
|
attempts a basic
|
satisfy
|
the most important
|
analysis of the
|
analysis of the
|
analysis of the
|
analysis of the
|
minimum
|
lesson you have
|
learning
|
learning
|
learning
|
learning
|
requirements
|
learnt as a result of
|
experience, the
|
experience, the
|
experience, the
|
experience, but
|
of reflecting
|
these discussions.
|
value of the
|
value of the
|
some value of the
|
the value of the the important
|
(8)
|
derived learning
|
derived learning
|
derived learning to
|
derived
|
lessons.
|
|
to self and the
|
to self and the
|
self.
|
learning to self
|
|
|
enhancement of
|
enhancement of
|
|
is vague.
|
|
|
the student’s
|
the student’s
|
|
|
|
|
appreciation for
|
appreciation for
|
|
|
|
|
the issues
|
the issues
|
|
|
|
|
surrounding the
|
surrounding the
|
|
|
|
|
topic.
|
topic.
|
|
|
|
Possible Marks
|
8.0 – 6.8
|
6.7 – 6.0
|
5.9 – 5.2
|
5.1 – 4.0
|
3.9 – 0
|
Provide references
|
Faultless
|
Very good
|
Good referencing,
|
Evidence of
|
Sub-standard
|
(at least three)
|
referencing,
|
referencing,
|
including
|
rudimentary
|
referencing.
|
using APA
|
including
|
including
|
reference list and
|
referencing
|
Poor quality
|
referencing system
|
reference list
|
reference list and
|
in text citations.
|
skills.
|
references.
|
including in text
|
and in text
|
in text citations.
|
Good quality
|
Mix of good
|
|
citations. (6)
|
citations.
|
High quality
|
references.
|
and
|
|
|
High quality
|
references.
|
|
poor quality
|
|
|
references.
|
|
|
references.
|
|
Possible Marks
|
6.0 – 5.1
|
5.04 – 4.5
|
4.44 – 3.85
|
3.84 – 3.0
|
2.9 – 0
|
100% Plagiarism Free & Custom Written
Tailored to your instructions