7504ICT Network and Information Security
Assignment 2
Due date: 3th June 2016 (Friday of Week 13) at 4.00pm
Please submit your report through through SafeAssign link at Learning@Griffith.
Value: 10% of the total assessment.
You can choose one of the following two options to complete the assignment:
Option 1:
You are required to research into one of the following topics on data security or computer-network security and to write a report. The report should be of ~2000-2500 words (around 4-5 A4 pages). Topics to select from are:
Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
DDoS attacks and anomaly detection
Security in digital content distributing systems
Digital copyright protection
Privacy and security issues in eHealth
Access control and data integrity for hospital databases
Password cracking and enhanced authentication
Security in on-line games
Digital watermarking and fingerprinting
Analysis of trade-off between data utility and privacy
Multimedia security and 3-dimensional (3D) encryption
Human factors in security implementation
Risk and disaster management in networked information systems
The report should provide an in-depth analysis of the topic based on your research. It is expected that the security theories, principles, and techniques covered by the subject are applied to your analysis.
Option 2:
Content or key leaking is a significant concern in networked environment. Detecting copyright infringement is a major global business problem. Some approaches to detecting infringements include monitoring P2P networks and blocking the data transfer and/or identifying the end users. However, since some data transferred using P2P networks is licensed to permit this, a heavy-handed approach to blocking all traffic is not appropriate. Also, while it is possible to monitor the content of (unencrypted) P2P traffic to search for matches on particular hashes of known copyrighted data, maintaining and distributing a list of all such files to all routers in real-time is not feasible.
Traditional encryption schemes (using AES that we have learned in this course, for example) alone do not provide a complete solution to this problem, because they do not prevent authorized users from transferring the clear-text content to other (unauthorized) users. Also, once the transfer has been completed, then there is no means to trace the source of the leak by any encryption scheme. Traitor-tracing schemes are an effective solution to this problem. Traitor-tracing schemes have been originally developed for tracing the content leak back to the pirate source in off-line environments (such as CD, DVD, etc.). Recently this technique has been adapted to network environment.
For this assignment, you are provided a research article (published in IEEE Transactions on Information Forensics and Security, vol.5, no.2, June 2010). Please read this article, and complete a report.
It is expected that your report: (1) should be of ~2000-2500 words; (2) should explain the procedures of the technique proposed by the article that is provided, and explain why the procedures work well in certain applications; (3) should present an analysis of effectiveness / performance of the technique proposed by the article; and (4) should analyse the weaknesses of the technique and propose an improvement.
Password cracking and enhanced authentication
Password cracking and enhanced authentication
find the cost of your paper
Is this question part of your assignment?
Place order
Posted on May 20, 2016Author TutorCategories Question, Questions