Information Technology Assignment Help
- Other / Other
- 13 Mar 2021
- Price: $34
- Computer Science Assignment Help / Information Systems and Technology
Information Technology Assignment Help
Assignment
Provide
an answer to each of the following questions. Refer to the marking guide when
preparing your response to see what criteria and standards will be used to
assess your work and your progress towards the related learning outcomes.
Task 1 answer to the question ,400 words
limit APA 6 referencing minimum 4 references
1.
The information relating to our daily life that
flows through a browser to the WWW could include classified/sensitive data.
Protecting classified data from malicious data exfiltration is important. SSL
(secure socket layer) is one of the leading protocols serving this purpose.
Your task is to - first, describe the basic concept of SSL. Then you need to
demonstrate how SSL provides confidentiality and authentication. Your answer
should be based on current literature with proper APA 6th referencing.
APA 6 referencing
Answer to the question 400 words
limit APA 6 referencing minimum 3 references
2.
Design an authentication framework that utilises
Kerberos based on a real-life scenario. In your design, make sure to address
potential attacks and how Kerberos can protect the system against them. Using a
diagram with a suitable use-case to support your claims is essential.
Your answers above should be supported by
authoritative sources, properly cited using APA 6th referencing.
Task 2: A preliminary draft report on Big Data Security 800 words 4
references apa 6
·
In this task need to write a preliminary research
report on Big Data Security
an emerging
area in information security, then discuss it with your peers, and later use
their feedback to improve your final report.
1.
Use at least
three reputable journal and/or conference papers and support your findings with
your own personal and/or workplace experience, if applicable.
Marking criteria
·
be able to identify and explain the
various digital threats to IT networks and computing devices.
·
be able to analyse cryptographic
algorithms, both symmetrical and asymmetrical, and explain how they are used to
improve network security.
·
be able to compare and contrast the
features of various authentication protocols.
·
be able to design security solutions
using existing authentication protocols.
·
be able to effectively communicate and
justify why a Public Key Infrastructure (PKI) is an important component in a
network security architecture.
This assessment item provides you with
the opportunity to:
·
Demonstrate factual knowledge,
understanding and application of state-of-art information security
·
Integrate and apply information from
various topics.
·
Apply understanding and knowledge to a
practical situation.
·
Collaborate and share knowledge in a
teamwork environment.
This assessment item also aims to:
·
Build an understanding and perspective
of current hot topics in network security.
·
Improve your critical thinking,
analysis and problem solving, and IT literacy.
·
Develop your teamwork collaboration
skills.
·
Enhance your capacity for lifelong
learning and an appreciation of its necessity.
Must
follow and meet the following guidelines
SSL
(Task 1.1: 15 Defines SSL with examples and demonstrates its ability to provide
confidentiality and authentication. The answers are logically structured to
create a cohesive and coherent piece of in-depth analysis. Fluent writing style
appropriate to assignment with proper in-text citation and references.
Authentication framework design
(Task 1.2
Comprehensive design that utilises all aspects of the
authentication protocol in a realistic scenario and identifies all potential
attacks and protection measures.
Research report draft
The report shows high ability to survey, summarise, integrate and
link information into a cohesive and coherent article using accurate scientific
terminology.