Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment - Research Essay

Assignment requires to complete a research essay about information security.  The research gives you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective. You will be required to complete and submit an essay on one of the topics listed below:

Topic: Security of information in government organisations.

The length of the essay should be 2,500 words

The research essay must be following:

Table of contents that covers all aspects of the assignment topics (see below).

Definitions and descriptions of the terms, ‘integrity’, ‘availability’ ‘confidentiality’, ‘authenticity’ and ‘non-repudiation’ in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about these assets that must be protected?

Definitions of human (people), technical (for ex intangible magnetic data held on a computer) and physical (tangible objects such as the computer hardware and a printed document) information assets at potential risk in the chosen topic environment.

Threats inherent in the chosen topic area: for ex, malware and Trojan horses, hackers, insider risks (social engineering) and threats, physical weaknesses – refer to the weekly lecture topic notes and recommended readings).

Implications of the threats that put organisations at risk.

Suggested counter-measures (including technical, physical AND personnel counter- measures).

References that are cited thoroughly in the essay – use EndNote, if you wish. This is available from the Library, free of charge. APA 5th should be used.

Include the marking sheet at the beginning of your essay along with the coversheet. This speeds up the marking process and ensures you get your paper graded promptly.

You will also be assessed on the presentation of your essay, as well as the contents. All assertions by other authors must be correctly referenced.  Please restrict your own comments to observations about the work of authors you are quoting.  Your own world view and statements of unsubstantiated facts (that are not referenced) do not earn marks. 

For Assignment , the Research Essay must be fully referenced where the assertions of other authors are being used and must first be submitted to Turnitin before it is submitted to LMS as a completed assignment. The Turnitin account that will have been prepared for you by the Unit Coordinator and available through the Unit LMS site.

Academic Integrity

10. Academic integrity involves behaving ethically and honestly in scholarship and relies on respect for others' ideas through proper acknowledgement and referencing of publications. 

11. Lack of academic integrity, including the exs listed below, may lead to serious penalties.

HINTS AND TIPS

Some additional hints to help you prepare your essay and enhance your grades.

FORMAT:

Essay style may be in report form or an essay – that is your choice.

Use of heading and a table of contents makes it easier for you to structure the essay in a logical and cohesive form.  It also makes it easier for the reader to navigate your essay and helps prepare the reader for each new major concept that you are introducing.

Include a descriptive title – many students do not do this – it’s like a sweet wrapper – is it a Fantale or a boring old Minty?  It prepares the reader for the delights you have in store for them!

Structure – should include:

Introduction – an overview of the key issues, concepts, etc., that you want to share with your reader – some of you may wish to include an abstract.

Body of the essay – more details of what you have stated in your introduction – use sub headings – logical flow of information and key and sub-topics – dot points ok, but don’t over use them – quotes should be kept to a minimum and are not included in the word count – extra points awarded for you paraphrasing the work of the authors you quote.  Again, read the problem.  What do you think it means? If you are unclear, email the Teaching Assistant and seek advice, but do some research first!

Use linking paragraphs to introduce the next topic -Some room for argument in your essay, but restrict this to your opinion of the work of credible authors you include in your essay.

Conclusion – no new information included here – reiterate the key points of the information you have provided in the body of your essay, and your conclusions about what you think are significant, trends, etc.

Referencing – as above – ensure it meets the academic standards of the university.  Suspected plagiarism will be reported to the Dean – so take care to avoid it.  Use APA 5th referencing please and use the right format.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M914259
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Project assignment software defined networks1introductionin

Project Assignment: Software Defined Networks 1 Introduction In this assignment you will learn how to use the OpenFlow protocol to program an SDN controller in a Mininet emulated network using POX. The following sections ...

Windows server deployment proposaleach student will create

Windows Server Deployment Proposal Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Lab questions1 when running snort ids why might there be no

Lab Questions 1. When running Snort IDS why might there be no alerts? 2. If we only went to a few web sites, why are there so many alerts? 3. What are the advantages of logging more information to the alerts file? 4. Wha ...

Assignmentyou are hired as a chief technology officer cto

Assignment You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the produ ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro