logo

Report On Current Hot Topics In Information Security

4 Pages2178 Words140 Views
   

Added on  2019-09-30

Report On Current Hot Topics In Information Security

   Added on 2019-09-30

ShareRelated Documents
TaskIn this assessment you are required to -- Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, associated challenges & problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions etc.)- Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own report and make refinements accordingly.- Raise questions about the information provided by other students (this must be done in an adequately professional manner)- Respond to questions raised about your own information and that of other students- Contribute to discussions in generalNote that the aim of this task is:1. to build an understanding and perspective of current hot topics in Information Security; and2. to build generic skills including, but not limited to:- a capacity for teamwork and collaboration;- an ability for critical thinking, analysis and problem solving;- information technology literacy;- a capacity for lifelong learning and an appreciation of its necessity.As such, the more you contribute to the development of these topics and related discussion the more likely you will score well in this task.Topics Set1. Digital signatures for secure e-commerce.2. Biometrics for authentication: past. present and future.3. Attacks against browsers and the potential countermeasures.4. Recent trends in malware.5. Signature-based intrusion detection systems.6. Security and privacy issues of VoIP and Skype.7. Privacy and security issues associated with Big Data.8. Smart device security.9. Internet of Things (IOT): Security issues and solutions.10. Threats to wireless networks and countermeasures.11. Bring Your Own Device (BYOD) security.12. Security and privacy issues in cloud computing.Your submission:You are required to prepare and submit a report on your topic to address the following issues (Lengthof the report:1500~2000 words, excluding references):a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportivedescriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.d. Discuss the impact of the above mentioned issues and their application/impact in the real world.e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.f. Provide references (at least three) using APA referencing system including in text citations.
Report On Current Hot Topics In Information Security_1
RationaleDepending on the topic selected, this assessment item relates to a number of key learning outcomes of your subject.Its also provides an opportunity for you to :- demonstrate factual knowledge, understanding and application of state-of-art information security;- demonstrates an understanding of what constitutes authoritative and valid evidence- demonstrate ability to identify, locate, critique, integrate and apply information from various topics and ;- apply valid and applicable knowledge and understanding to a practical situation;- analyse current data to construct and communicate new knowledge- demonstrate ability to work in a team, sharing knowledge.Marking criteriaAssessment criteriaAssessable ComponentsHD100% - 85%DI84% - 75%CR74% - 65%PS64% - 50%FL49% - 0Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.(10)Demonstrate anability to surveythe literature,concise summarywhich arelogicallystructured,integrate and linkinformation intocohesive andcoherent piece ofanalysis andconsistently usecorrect to theselected topicterminologies andsophisticatedlanguage.Demonstrate anability to surveythe literature,concise summarywhich arelogicallystructured tocreate cohesiveand coherentpiece of analysisthat consistentlyuse correctforensicterminologies.Demonstrate anability to survey theliterature, concisesummary which aregenerally logicallystructured to createa comprehensive,mainly descriptivepiece of analysis.Some use of correctforensicterminologies.Demonstrate anability to surveythe literature,concisesummary whichpartiallystructured intoloosely-linkedrudimentarysentences tocreate acomprehensive,descriptive pieceof analysis.Some use ofcorrect forensicterminologies.Fails todemonstratethe ability tosurvey theliterature,concisesummarywhichpartiallystructured andmay tend tolistinformation.Uses frequentinformallanguage.Possible Marks10.0 – 8.58.4 – 7.57.4 – 6.46.4 – 54.9 – 0Summarize the issues discussed in the forum (at least two peers). Discuss how your own postscontributed to this knowledge and discuss whether or not the summary presented by your peers is accurate. (10)The DI criteria, plus:Summary of the literature (the forum posting above) also exhibits significant creativity and innovation in the way it depicts and presents the design concept and supportive information.Feedbackprovided to twocohort colleaguesoffers in-depthinsights andrelies stronglyprompts onbroaderSummary of the literature (the forum posting above) is strongly student-centred or reader-orientated, strikes a balance between being simple, informative and engaging and is supported by brief descriptions, how it fits withinthe subject.Feedback provided to two cohort colleaguesis informed, constructive and Summary of the literature (the forumposting above) strikes a balance between being simple, informative and engaging and issupported by brief descriptions, how it fits within the topic.Feedback provided to two cohort colleagues is informed, constructive and progressive and feedback received is critically reviewed with changes made supported through reliance on Information Summary of the literature (the forum posting above) is supported by brief descriptions, how it fits within the topic. Feedback provided to two cohort colleagues is informed and constructive andfeedback received is reviewed with changes made toyour report accordingly.Fails tosummarisethe literature(the forumpostingabove) andfeedbackprovided tocohortcolleagues isinadequate/orlackingresearch. Usesfrequentinformallanguage.
Report On Current Hot Topics In Information Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Privacy and Security in Social Media
|12
|2454
|750

Information Security Assignment | Security and Privacy
|9
|2067
|44

Emerging Technologies and Innovation Assignment
|14
|1787
|49

Security and Privacy Issues: Assignment
|8
|2762
|250

Information Security Assignment | Trends in Malware
|14
|2540
|93

CRN Assessment Type and Name: Manage Operational Plan BSBMGT517 - Written Case Study, Project, Presentation, and Other Assessments
|24
|4479
|500