A. Essay QuestionsWrite minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each...


A. Essay QuestionsWrite minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each question according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per question will be appropriate.


Question 1Research the concept of Quantum key distribution (QKD) in the context of information security and report your findings. Your report should include the following details: what quantum key distribution means; quantum key exchange; vulnerabilities of QKD; and future directions of QKD.Question 2There are several filtering mechanisms available to examine packets using firewalls. Research various firewall filtering mechanisms and write a short report comparing four popular filtering mechanisms. Use the following criteria for comparison: filtering technique; complexity; usage; and future trends.


B. Hands-on TaskIt is a common misconception that HTTPS provides anonymous Web browsing. This is not the case. A secured HTTPS connection can ensure confidentiality (what you're sending can't be read by others) and authentication (the website you're visiting is really who they say they are). However, it does not provide anonymity. Eavesdroppers cannot see what you are sending, but they can see that you are sending something to that website.


Onion routing can provide anonymity via an encrypted network of "relay" servers. Computers around the world pass your fully encrypted traffic. The intermediary relay servers do not know the entire path of the onion network. Requests that come from you appear to originate from around the world. You have complete anonymity. It's still a good idea to use a secured end-to-end HTTPS connection, because the connection between the last relay server and the site you are visiting is not encrypted.1. Open a Web browser.2. Go to http://www.google.com/.3. Search for “my IP address.”4. Press Enter.5. Click on the first result.6. Take a screenshot showing your IP address.7. Go to www.TorProject.org.8. Click Download.9. Click on the link for Windows 10 (or as appropriate) under Tor Browser Bundle.10. Save the file in your download folder.11. Browse to your download folder.12. Right-click the Tor executable and select "run as administrator."13. Click Yes, and Extract.14. Browse to the C:\security\Tor Browser folder.15. Right-click the executable labeled "Start Tor Browser.exe" and select "Run as administrator."16. Click Yes. (A new Web browser window should open.)17. Within the Web browser, go to www.Google.com.18. Search for "my IP address."19. Click on the first result. (If you get a warning about an "Untrusted" connection, just click on I Understand the Risks, Add Exception, and Confirm Security Exception.)20. Take a screenshot showing the new IP address. (This is someone else's IP address.)Your submission should include the following:A report presenting a brief discussion about Tor and an explanation of the two screenshots obtained in Step 6 and Step 20. Include the two screenshots within your report. Use appropriate captions. (Maximum word limit=850)RATIONALEback to top

This assessment task will assess the following learning outcome/s:



  • be able to explain fundamental information security concepts.

  • be able to discuss and debate some of the security implications of computer networks, including cryptography.

  • be able to compare and contrast firewall technologies.


MARKING CRITERIA AND STANDARDSback to top






































































CriteriaHD100% - 85%DI84% - 75%CR74% - 65%PS64% - 50%FL49% - 0
A. Essay Questions
Able to apply theories and concepts to analyse IT security implicationsDemonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through indepth discussion, providing highly relevant real world examples.Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis with suitable examples.Correct application of the IT Security perspective and mostly comprehensive analysis with suitable examples.Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission.Major omissions in the application of the IT security concepts and the analysis.
Demonstrates application of research skills through the critical analysis and evaluation of relevant literatureLiterature and sources presented is evidence of high level application of research skills; with comprehensive and critical appraisal of the literature and discussion of theory supported by sources in addition to those recommended in the course content. Referencing style has no mistakes.Clear evidence of research relevant to the subject; able to critically appraise the literature and theory gained from a variety of sources. Referencing style correctly used.Clear evidence of research relevant to the subject; uses indicative texts identified. Referencing style correctly used. Minor omissions only.Some evidence of research. Some mistake in referencing style.Either no evidence of literature being consulted or cited references irrelevant to the assignment set.
Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements.The tone and style is exemplary, and is appropriate to the content of the scholarly review.Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling.Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only.Writing stylenot alwaysfluent or wellorganised andgrammar andspelling containerrors.Writing stylenot fluent orwell organisedand manygrammatical andspellingmistakes.
B. Hands-on Task
1.The task was appropriately completed, as is evident from the two screenshots.The task was appropriately completed, as is evident from the two screenshots. Minor omissions only.The task was mostly appropriately completed, as is evident from the screenshots. Some omissions.The task was rightly done. Some evidences have been provided.Little or no evidences of the task being appropriately done.
2.
Able to apply theories and concepts to analyse IT security implicationsDemonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through indepth discussion.Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis.Correct application of the IT Security perspective and mostly comprehensive analysis.Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission.Major omissions in the application of the IT security concepts and the analysis.
Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements.The tone and style is exemplary, and is appropriate to the content of the scholarly review.Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling.Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only.Writing stylenot alwaysfluent or wellorganised andgrammar andspelling containerrors.Writing stylenot fluent orwell organisedand manygrammatical andspellingmistakes.

REQUIREMENTSback to top

1. All sources of information must be appropriately referenced using the APA style ( http://student.csu.edu.au/library/integrity/referencing-at-csu )2. You must submit one single WORD or PDF filefor this assessment item.

Jan 02, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here