Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Option 1:

You can are required to research into one of the following topics on data security or computer-network security and to write a report. The report should be of 1500 - 2000 words.

Topics to select from are:
- Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
- Multi-factor authentication and its applications
- Security in digital content distributing systems
- Digital copyright protection
- Privacy protection in electronic commerce
- Privacy and security issues in eHealth

- Access control and data integrity for hospital databases
- Protection of network-based systems against distributed denial-of-service attacks
- IPsec implementation issues in wireless networks
- Secure wireless routing
- Challenges and solutions for security in mobile ad-hoc networks
- Security in peer-to-peer networks
- Security in on-line network games
- IPv6 security issues

- Digital watermarking and fingerprinting

The report should provide an in-depth analysis of the topic based on your research. It is expected that: (1) The security theories, principles, and techniques covered by the subject are applied to your analysis; and (2) The report should include your research findings.

Please note that every student is welcome to choose this option. If you have completed a research report for your first assignment, you may select a new topic to do or continue your topic for the first assignment.

For those who choose to do research and to write reports for both assignments 1 and 2, please make sure that the two research reports are different in the following aspects.

(1) The second research report should include applications of the security theories, principles, and techniques of the subject.

(2) The second report should include your research findings (such as, improved security techniques, improved protocols, or new security techniques proposed by yourself).

(3) The two reports should not have 20% or more overlap (if you choose the same topic as the first assignment).

Option 2:

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:

(a). The simulator will have at least two servers: database server and web server.

(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.

(c). The office in Singapore cannot access the database.

(d). The office in Hong Kong cannot access the web services.

(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e).

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9749976

Have any Question?


Related Questions in Computer Network & Security

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

True or false1 tcp ensures error free transmission2 the

TRUE or FALSE 1. TCP ensures error free transmission. 2. The process that initiates the communication is the server. 3. A host can serve as both server and client in a P2P network. 4. Audio and video applications cannot ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As