#Sales Offer!| Get upto 25% Off:

In this assessment task you are required to select a topic for your research project from the list of research areas/topics provided below:

  • Quantum cryptography
  • Evolution of malware
  • Internet of Things (IoT) /Smart Architectures: Security and privacy issues and solutions
  • Biometric authentication
  • Cloud computing security: Challenges and solutions
  • Security issues in Software Defined Networks (SDN)
  • Intrusion detection and prevention systems
  • Dark web
  • Investigating security of Blockchain enabled applications
  • Cyber warfare
  • Wireless Network security
  • BYOD security
  • Data Exfiltration techniques
  • Big data security and privacy issues and solutions

In this assessment, you are required to submit the title and an abstract for your selected research project. Your abstract should briefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important.

At the end of the submission, you should include a “Reference” section that will have a minimum of two articles (at least one journal article) used to build your discussion for this abstract. However, do not cite references within the body of the abstract.

 

Rationale

back to top

This assessment task will assess the following learning outcome/s:

  • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
  • be able to explain the fundamental concepts of cryptographic algorithms.
  • be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
  • be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
  • be able to investigate and justify the use of the access control mechanisms and user authentication processes.
  • be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

This assessment has been designed to assist students with the completion of Assessment 5 (Research Project Report). The aim of this task is to help students :

  • to build an understanding and perspective of current and emerging topics in Information Security;
  • to help the students to formulate their research project in a step by step manner; and
  • to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!