07 Jun Griffith Univ- You are required to research into one of the following topics on data security or computer
Question
Option 1:
You can are required to research into one of the following topics on data security or
computer-network security and to write a report
1
7504ICT Network and Information Security
Assignment 2
Due date: 23rd May 2014 (Friday of Week 11)
The report should be submitted through the Safe Assigment under the Assessment section on
the course site at Learning@Griffith.
Value: 10% of the total assessment.
You can choose one of the following two options to complete the assignment:
Option 1:
You can are required to research into one of the following topics on data security or
computer-network security and to write a report. The report should be of 1500 – 2000 words.
Topics to select from are:
? Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
? Multi-factor authentication and its applications
? Security in digital content distributing systems
? Digital copyright protection
? Privacy protection in electronic commerce
? Privacy and security issues in eHealth
? Access control and data integrity for hospital databases
? Protection of network-based systems against distributed denial-of-service attacks
? IPsec implementation issues in wireless networks
? Secure wireless routing
? Challenges and solutions for security in mobile ad-hoc networks
? Security in peer-to-peer networks
? Security in on-line network games
? IPv6 security issues
? Digital watermarking and fingerprinting
The report should provide an in-depth analysis of the topic based on your research. It is
expected that: (1) The security theories, principles, and techniques covered by the subject are
applied to your analysis; and (2) The report should include your research findings.
2
Please note that every student is welcome to choose this option. If you have completed a
research report for your first assignment, you may select a new topic to do or continue your
topic for the first assignment.
For those who choose to do research and to write reports for both assignments 1 and 2,
please make sure that the two research reports are different in the following aspects.
(1) The second research report should include applications of the security theories,
principles, and techniques of the subject.
(2) The second report should include your research findings (such as, improved security
techniques, improved protocols, or new security techniques proposed by yourself).
(3) The two reports should not have 20% or more overlap (if you choose the same topic
as the first assignment).
Option 2:
Based on the following background information and project requirements, complete a project
making use of OPNET:
Background: AusCloud Brisbane is an IT company located in Brisbane. The company has
offices in Melbourne and Sydney. They are now planning to extend the businesses to
Singapore and Hong Kong. The company has experienced several security attacks in the
past, for example, some business data labelled as “sensitive” and “confidential” has been
found in a report published on the Internet, and a number of malicious intrusions to the
network of the company have been detected. The company has just made a budget to support
a plan for improving the security of the network and information system. The plan includes
improving the security of the current network and establishing a secure environment for data
exchange between the headquarters (Brisbane) and other offices.
Project Description: The objectives of the project include: (1) to study how the database
and web services can be protected against unauthorized use while maintaining access for
authorized users by using firewall and VPN techniques; and (2) to study how secure data
exchange over the Internet can be achieved by using encryption.
For the project, you are required, based on the background information given above, to
implement a simulator using the OPNET IT Guru. On completion of the project you are
expected to submit a report. (The requirements for the simulator and the report will be given
below).
Requirements for the simulator:
(a).The simulator will have at least two servers: database server and web server.
(b).The offices in Melbourne and Sydney can access all the data, web services, and other
applications.
(c).The office in Singapore cannot access the database.
(d).The office in Hong Kong cannot access the web services.
(e).The information exchange between the headquarters and authorized offices should be
protected by encryption (hints will be given below on simulating the effect of
encryption by using OPNET).
3
(f). The simulator should include the following scenarios for comparison purpose:
? Scenario 1: No firewall, VPN, or encryption is employed, that is, a network
without any protection.
? Scenario 2: Only firewall is implemented.
? Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements
(a) – (d) given above.
? Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the
requirements (a)-(e).
The report should include:
? A summary of the addressed topic and the objectives of the project.
? Procedure of implementing the simulator, including the steps of creating and
configuring the scenarios.
? Results obtained throughout the simulation.
? Analysis of the simulation results, a comparison of the results between scenarios, and
a comparison of the simulation results with the theoretical expectations. This part
should include an explanation of the following:
? For each of the requirements (b)-(e), how do you know it has been met? and
by what simulation results?
? How does the implementation of security techniques affect the network
performance?
? A conclusion that includes what you have learned and recommendations you wish to
make to the company, AusCloud Brisbane.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
