Assignmentis based on high level

Promotion & Public Relations
July 26, 2020
Personality Assessment of Jaylene Smith
July 26, 2020

Assignmentis based on high level

the subject is networking and security . select the topic given in the suggestions and so the best one u can

Document Preview:

7504ICT Network and Information Security Assignment 1 Due date: 11th April 2014 (Friday of Week 6) The report should be submitted through the SafeAssigment under the Assessment section on the course site at Learning@Griffith. Value: 10% of the total assessment. The goal of this assignment is to provide exposure to a typical network security problem. This is an individual assignment. For the assignment, you are required to implement (or test) a security mechanism and write a report, or to write a research report based on an in-depth analysis (possibly with a case study). The topic, may be of your interest, needs to be approved in advance by the course convenor Dr Xin-Wen Wu; other than that, there are no restrictions. If you choose to complete a research report (not an implementation or a test of a security mechanism) for the assignment, the research report should be of at least 1500 words. The exact marking scheme will depend on the type of project (e.g. level of implementation required/non-implementation/etc). However, the following may be used as some indication: For implementation projects: Implementation up to 60% Report up to 40% For reports which do not involve any implementation: Format & Presentation up to 15% Review of literature and related work up to 25% Critical analysis up to 50% References up to 10% Possible Topics: You can choose one of the following topics to complete the assignment: ? Developing an encryption/decryption demo (mainly for learning and teaching purposes) ? Developing a secure on-line micro-payment system ? Developing a simple biometric authentication model
? Developing firewall architecture for WLANs ? Developing security management framework for wireless networks ? Enhancing security in Internet banking ? Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.) ? Multi-factor authentication and its applications ? Security in digital content distributing systems ? Digital copyright protection ? Privacy protection

Attachments:

network-and-i.pdf