Network and information security compelling advantages of having live homework help at your service

Network and information security compelling advantages of having live homework help at your service

7504ICT Network and Information Security
Assignment 2
Due date: 23rd May 2014 (Friday of Week 11)
The report should be submitted through the SafeAssigment under the Assessment section on the course site at [email protected]
Value: 10% of the total assessment.
You can choose one of the following two options to complete the assignment:
Option 1:
You can are required to research into one of the following topics on data security or computer-network security and to write a report. The report should be of 1500 – 2000 words. Topics to select from are:
 Cryptanalysis of well-known ciphers (e.g., AES, RSA, SHA, etc.)
 Multi-factor authentication and its applications
 Security in digital content distributing systems
 Digital copyright protection
 Privacy protection in electronic commerce
 Privacy and security issues in eHealth
 Access control and data integrity for hospital databases
 Protection of network-based systems against distributed denial-of-service attacks
 IPsec implementation issues in wireless networks
 Secure wireless routing
 Challenges and solutions for security in mobile ad-hoc networks
 Security in peer-to-peer networks
 Security in on-line network games
 IPv6 security issues
 Digital watermarking and fingerprinting
The report should provide an in-depth analysis of the topic based on your research. It is expected that: (1) The security theories, principles, and techniques covered by the subject are applied to your analysis; and (2) The report should include your research findings.
Please note that every student is welcome to choose this option. If you have completed a research report for your first assignment, you may select a new topic to do or continue your topic for the first assignment.
For those who choose to do research and to write reports for both assignments 1 and 2, please make sure that the two research reports are different in the following aspects.
(1) The second research report should include applications of the security theories, principles, and techniques of the subject.
(2) The second report should include your research findings (such as, improved security techniques, improved protocols, or new security techniques proposed by yourself).
(3) The two reports should not have 20% or more overlap (if you choose the same topic as the first assignment).
Option 2:
Based on the following background information and project requirements, complete a project making use of OPNET:
Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the past, for example, some business data labelled as “sensitive” and “confidential” has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.
Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.
For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).
Requirements for the simulator:
(a). The simulator will have at least two servers: database server and web server.
(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.
(c). The office in Singapore cannot access the database.
(d). The office in Hong Kong cannot access the web services.
(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).
(f). The simulator should include the following scenarios for comparison purpose:
 Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.
 Scenario 2: Only firewall is implemented.
 Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) – (d) given above.
 Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e).
The report should include:
 A summary of the addressed topic and the objectives of the project.
 Procedure of implementing the simulator, including the steps of creating and configuring the scenarios.
 Results obtained throughout the simulation.
 Analysis of the simulation results, a comparison of the results between scenarios, and a comparison of the simulation results with the theoretical expectations. This part should include an explanation of the following:
− For each of the requirements (b)-(e), how do you know it has been met? and by what simulation results?
− How does the implementation of security techniques affect the network performance?
 A conclusion that includes what you have learned and recommendations you wish to make to the company, AusCloud Brisbane.

Don't use plagiarized sources. Get Your Custom Essay on
Network and information security compelling advantages of having live homework help at your service
Our work is always; • #Top-Quality • #Plagiarism-free
Order Essay

Place Your Order
(275 Words)

Approximate Price: $9

Calculate the price of your order

275 Words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total Price:
The price is based on these factors:
Academic Level
Number of Pages
Principle features
  • Free cover page and Reference List
  • Plagiarism-free Work
  • 24/7 support
  • Affordable Prices
  • Unlimited Editing
Upon-Request options
  • List of used sources
  • Anytime delivery
  • Part-by-part delivery
  • Writer’s sample papers
  • Professional guidance
Paper formatting
  • Double spaced paging
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)
  • 275 words/page
  • Font 12 Arial/Times New Roman

•Unique Samples

We offer essay help by crafting highly customized papers for our customers. Our expert essay writers do not take content from their previous work and always strive to guarantee 100% original texts. Furthermore, they carry out extensive investigations and research on the topic. We never craft two identical papers as all our work is unique.

•All Types of Paper

Our capable essay writers can help you rewrite, update, proofread, and write any academic paper. Whether you need help writing a speech, research paper, thesis paper, personal statement, case study, or term paper, essay writing service is ready to help you.

•Strict Deadlines

You can order custom essay writing with the confidence that we will work round the clock to deliver your paper as soon as possible. If you have an urgent order, our custom essay writing company finishes them within a few hours (1 page) to ease your anxiety. Do not be anxious about short deadlines; remember to indicate your deadline when placing your order for a custom essay.

•Free Revisions and Preview

To establish that your online custom essay writer possesses the skill and style you require, ask them to give you a short preview of their work. When the writing expert begins writing your essay, you can use our chat feature to ask for an update or give an opinion on specific text sections.

A Remarkable Student Essay Writing Service

Our essay writing service is designed for students at all academic levels. Whether high school, undergraduate or graduate, or studying for your doctoral qualification or master’s degree, we make it a reality.