Get Cheapest Assignment in Australia, UK, US, UAE, Canada and NZ Order Now

Get Help with Networks Security Assignment

0 Comments

Get Help with Networks Security Assignment in KIT501 – ICT Systems Administration Fundamentals with Punjab Assignment Help!

Due date: 11:59 pm Thursday 7th April (week 7)

Weight: 15%

Length: 2000 words

This assignment requires you to investigate and write an essay (in English) on a specified topic relating to networks and security. There are three topics to choose from in different areas that relate to the content of this unit and its extended field of interest.

  • This assignment needs to be completed as an individual. You must not engage nor employ others to write the essay for you – this is considered academic misconduct.
    • You must select and write about one of the 3 available topics listed below, and you may not resubmit work previously submitted for this or other units you have studied in the past.
    • This assignment is to be approximately 2000 words in length (plus or minus 10%, not including the references section). You are highly encouraged to include relevant diagrams and figures to make your essay more readable and interesting.
    • Your essay must not include a table of contents nor an executive summary. However, you should consider including logical sections and subsections (with titles) to improve the essay’s readability.

Please pay close attention to the section near the end of this document on plagiarism. We treat plagiarism very seriously, and, if detected, it can lead to some serious penalties.

Topic list

Choose from one of the following 3 topics. Your essay title must specify which topic you have chosen (topic 1, 2 or 3):

  1. Zero-day attacks associated with hardware or software systems are becoming more common. Discuss these types of attack, including recent examples, why such attacks are increasing in frequency, and what preventative or mitigation actions are possible. Include in your discussion the key drivers behind exploit development for these attacks, who is doing it, and why.
  2. The recently discovered Log4J vulnerability has highlighted security-related issues with open source software dependency supply chains (repositories). Discuss the Log4Shell issue in depth, including who is affected, and what steps can be taken for mitigation. Your discussion should also consider the deliberate exploitation of the supply chain in general and why supply chain vulnerability is a security issue.
  3. Biometric authentication systems are an increasingly attractive alternative to password schemes that are still the most used authentication method. Discuss the benefits of biometric authentication, what biometric features are commonly sampled, and identify why the wider adoption of such systems has not yet occurred. As part of your answer you should consider the potential vulnerabilities that these systems may have, as well as any ethical and/or legal implications.

Citations and Referencing

This is a research assignment, and as such you are expected to read a range and diversity of content on your topic, and based on your reading, your thoughts, and understanding in the area, condense/summarise the topic in your essay. This means putting content into your own words and citing where it has come from.

You are expected to use a range of different sources, including academic sources.

What is an academic source?

Most academic sources will likely be formally peer-reviewed articles that have been published in journals or conferences, although other sources are permitted (such as books, and government and/or standards bodies documents). Magazines, web sites, blog posts and news articles are not considered to be academic sources – you may still include them as sources, but your marks will be improved when academic sources are also included (please see the marking rubric).

What do I have to cite?

All source material (anything you have read and obtained from elsewhere) must be cited and then be listed in a references section at the end of the assignment. Correctly citing and referencing the content you have used makes up a significant part of your final mark. You must use citations and referencing when making statements that are not otherwise common

knowledge – you provide citations to justify all claims or statements you have made in your essay:

‘A citation is a reference to the source of information used in your research. Any time you directly quote, paraphrase or summarize the essential elements of someone else’s idea in your work, an in-text citation should follow. An in-text citation is a brief notation within the text of your paper or presentation which refers the reader to a fuller notation, or end-of-paper citation, that provides all necessary details about that source of information.’ (Suny Empire 2021)

In other words, any borrowed ideas (which include direct quotes such as that above), must be acknowledged through the form of an in-text citation in the body of your essay (Victoria University 2015).

What referencing style do I have to use?

You are required to use the Harvard referencing style, which in simplest terms, is the Author/Year style. More information can be found by following the links below.

  • https://utas.libguides.com/referencing/Harvard
    • https://mylo.utas.edu.au/d2l/le/content/506348/viewContent/4322786/View
    • https://libraryguides.vu.edu.au/harvard/getting-started-with-harvard-referencing

There is also a brief, non-assessed quiz in unit’s MyLO site to help you consolidate your knowledge on the Harvard referencing style:

  • Assessments→Quizzes→Referencing Quiz

Plagiarism and Academic Integrity

Plagiarism is a very serious matter, and ignorance of this is not an excuse. If you submit work, claiming it to be your own, and it is not original work of your own, this is cheating. This includes (but is not limited to) trying to obscure the source of your work (such as blocks of text submitted as images), using language translation services to source text from one language and convert to another, or paying individuals or companies to do the work for you. Plagiarism can result in academic penalties both in relation to your assignment, and on your permanent university record.

If the work you submit is that of another person, without appropriate attribution (such as citation and references), then an academic misconduct case may be filed against you with the possible penalties mentioned above.

Where can I find more information on academic integrity?

More information can be found here:

  • https://universitytasmania.sharepoint.com/sites/StudentPortal/SitePages/Academic

-Integrity.aspx

  • https://faq.utas.edu.au/app/answers/detail/a_id/1947/~/what-is-plagiarism-and- academic-integrity%3F

Note: We will be using Turnitin as a plagiarism detection tool.

Submission

The essay is due on Thursday the 7th of April (Week 7) at 11:59 pm. You must submit your assignment in MyLO via the assignment submission link in the Assessment section of the MyLO unit website.

  • The submission must be a single Word document
  • Do not submit in PDF format, and do not ZIP or compress your file before submission
  • You are not required include an electronic cover sheet, as submitting to MyLO is an implicit acknowledgement of accepting the University’s policies around plagiarism and your way of claiming that this is entirely your own work.

Hints

“where should I start?”

  • the library online catalogue search is a good starting place to search for academic references

e.g. https://www.utas.edu.au/library/find/megasearch (but note however not all search results are academic in nature, some search results are news sites and magazines etc)

  • Google scholar (or international alternatives) is also good for finding academic sources – https://scholar.google.com.au
  • Web sites (for news articles, blogs, security company technical papers etc)
  • Textbooks on networking and security

How is your essay marked?

Your essay will be marked against the rubric that can be found on the next page. Please pay close attention to the weighting % of each criterion and how each grade (HD, DN etc) is assigned. Also note, for example, the Referencing criteria do not mean you will automatically get full marks (25%) if you have 10 or more sources, including 6 academic sources – the mark is assessed on how well you use the sources (e.g. are they relevant), the referencing style, as well as the source quality (for example, are too many of the references from the one web site, or the one company, or the one news report, and are they just blog sites etc).

Get Help with Networks Security Assignment in KIT501 – ICT Systems Administration Fundamentals with Punjab Assignment Help!

Students can avail of assignment help services for Ethics Project in MIS610 Advanced Professional Practice with the Punjab Assignment help team as they offer 100% plagiarism free content, on-time delivery and an affordable price range. Our experts have deep knowledge of the Professional Communications subject. Contact us today for assignment help and get a winning edge over fellow students. Contact us at Punjabassignmenthelp@gmail.com or call +918053884564.