Ask Question, Ask an Expert


Ask Computer Network & Security Expert

Assignment - Research Essay

Assignment requires to complete a research essay about information security.  The research gives you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective. You will be required to complete and submit an essay on one of the topics listed below:

Topic: Security of information in government organisations.

The length of the essay should be 2,500 words

The research essay must be following:

Table of contents that covers all aspects of the assignment topics (see below).

Definitions and descriptions of the terms, ‘integrity’, ‘availability’ ‘confidentiality’, ‘authenticity’ and ‘non-repudiation’ in relation to the security protection of information assets in the chosen topic environment, i.e. what is it about these assets that must be protected?

Definitions of human (people), technical (for ex intangible magnetic data held on a computer) and physical (tangible objects such as the computer hardware and a printed document) information assets at potential risk in the chosen topic environment.

Threats inherent in the chosen topic area: for ex, malware and Trojan horses, hackers, insider risks (social engineering) and threats, physical weaknesses – refer to the weekly lecture topic notes and recommended readings).

Implications of the threats that put organisations at risk.

Suggested counter-measures (including technical, physical AND personnel counter- measures).

References that are cited thoroughly in the essay – use EndNote, if you wish. This is available from the Library, free of charge. APA 5th should be used.

Include the marking sheet at the beginning of your essay along with the coversheet. This speeds up the marking process and ensures you get your paper graded promptly.

You will also be assessed on the presentation of your essay, as well as the contents. All assertions by other authors must be correctly referenced.  Please restrict your own comments to observations about the work of authors you are quoting.  Your own world view and statements of unsubstantiated facts (that are not referenced) do not earn marks. 

For Assignment , the Research Essay must be fully referenced where the assertions of other authors are being used and must first be submitted to Turnitin before it is submitted to LMS as a completed assignment. The Turnitin account that will have been prepared for you by the Unit Coordinator and available through the Unit LMS site.

Academic Integrity

10. Academic integrity involves behaving ethically and honestly in scholarship and relies on respect for others' ideas through proper acknowledgement and referencing of publications. 

11. Lack of academic integrity, including the exs listed below, may lead to serious penalties.


Some additional hints to help you prepare your essay and enhance your grades.


Essay style may be in report form or an essay – that is your choice.

Use of heading and a table of contents makes it easier for you to structure the essay in a logical and cohesive form.  It also makes it easier for the reader to navigate your essay and helps prepare the reader for each new major concept that you are introducing.

Include a descriptive title – many students do not do this – it’s like a sweet wrapper – is it a Fantale or a boring old Minty?  It prepares the reader for the delights you have in store for them!

Structure – should include:

Introduction – an overview of the key issues, concepts, etc., that you want to share with your reader – some of you may wish to include an abstract.

Body of the essay – more details of what you have stated in your introduction – use sub headings – logical flow of information and key and sub-topics – dot points ok, but don’t over use them – quotes should be kept to a minimum and are not included in the word count – extra points awarded for you paraphrasing the work of the authors you quote.  Again, read the problem.  What do you think it means? If you are unclear, email the Teaching Assistant and seek advice, but do some research first!

Use linking paragraphs to introduce the next topic -Some room for argument in your essay, but restrict this to your opinion of the work of credible authors you include in your essay.

Conclusion – no new information included here – reiterate the key points of the information you have provided in the body of your essay, and your conclusions about what you think are significant, trends, etc.

Referencing – as above – ensure it meets the academic standards of the university.  Suspected plagiarism will be reported to the Dean – so take care to avoid it.  Use APA 5th referencing please and use the right format.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M914259
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question? 

Related Questions in Computer Network & Security

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Project- information security standards csialearning

Project- Information Security Standards CSIA Learning Objectives After completing this project, students will be able to: 1. Identify recognized US Standards Organizations 2. Describe at least two technical standards 3. ...

Summarize what pki is and how it works include the use of a

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Any encryption algorithm like caesar cipher algorithmshould

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document. Cryptography Assignment Given the following S-Boxes: S1= [ 15        10            2        ...

Network troubleshooting knowledgebasecreate knowledgebase

Network Troubleshooting Knowledgebase Create knowledgebase documentation/article(s) covering the topics below. These would be documents that you could store in a department knowledgebase that would provide a quick refere ...

Network assignmentoverviewyou will provide a detailed

Network Assignment Overview You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria: • Each Classroom Computer Lab will be on a separate n ...

The project requires a significant amount of work on

The project requires a significant amount of work on research, design and implementation. It is advised that you should start the project as soon as possible. A Simple File Transfer Protocol Design and implement a simple ...

Assignment identifying potential malicious attacks threats

Assignment: Identifying Potential Malicious Attacks, Threats and Vulnerabilities You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is ide ...

Yummy good treats has a number of traveling salespeople who

Yummy Good Treats has a number of traveling salespeople who cover territories throughout the Midwest. These employees use laptops with wireless Internet connections and mobile phones to communicate with the home office. ...

1overviewthe learning objective of this assignment is for

1 Overview The learning objective of this assignment is for students to get familiar with the concepts in the security techniques such as symmetric and asymmetric encryption, hashing and certificates in Public Key Infras ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate