Assessment item 5 back to top Research project (Report) Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: XXXXXXXXXXwords (Excluding references) Submission method options: Alternative...

1 answer below »
continuation of order id 33281.strictly no plagiarism.follow the rules and requirements.


Assessment item 5 back to top Research project (Report) Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: 1500-2000 words (Excluding references) Submission method options: Alternative submission method Task back to top In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects: · Overview of the topic · Relevant technologies and applications of those technologies · Highlighting the challenges/problems in your chosen research area · Identification of any gaps in the literature by: · discussing areas/issues that you believe have been addressed in the current literature; · highlighting areas/issues that have not been addressed or adequately addressed; and · discussing your view(s) on the issue(s) that you see as being critical. · Summarize the future research directions based on the identified research gaps To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 7 research articles. Students are encouraged to access such research articles from well-known and reputed research portals such as IEEE, ACM, Springer, Science Direct etc. Please note Wikipedia and general blogs will not be considered as acceptable citations. Your report should include the following sections. A template will also be made available in the Resources section of your subject Interact2 site. Abstract (As submitted for Assessment 3) Your abstract should briefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important. Keywords Three to seven keywords representing the main content of the report. Introduction The Introduction section should explain the background to the report, its aims, a summary of the relevant existing literature and the issue/issues under discussion. Main text This should contain the body of the report and should be broken into appropriate subsections with short, informative headings and sub-headings. Conclusions This should clearly mention the main conclusions and include an explanation of their relevance or importance to the field. References List the references used in your research. Rationale back to top This assessment task will assess the following learning outcome/s: · be able to justify security goals and the importance of maintaining the secure computing environment against digital threats. · be able to explain the fundamental concepts of cryptographic algorithms. · be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats. · be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system. · be able to investigate and justify the use of the access control mechanisms and user authentication processes. · be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality. This assessment continues from/links back to Assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security. The aim of this task is to help students : · to demonstrate the ability to integrate and apply information from various topics; · to build an understanding and perspective of current and emerging topics in Information Security; · to help the students to formulate their research project in a step by step manner; and · to build generic skills including, critical thinking, analysis, problem-solving in the context of Information Security Marking criteria and standards back to top Assessment criteria Assessable Components HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 Abstract (5 Marks) A very concise abstract where the aim of the study is perfectly articulated, the central question is precisely formulated, A concise abstract where the aim of the study is appropriately articulated, the research question is formulated. A concise abstract where the aim of the study is relatively articulated, the research question is adequately formulated. A concise abstract where the aim of the study is articulated, the research question is vaguely formulated. Incomplete abstract with no research question identified. Introduction and background (3 Marks) A comprehensive discussion in relation to the research background as well as the aim/objectives of research is included.  A highly detailed discussion in relation to the significance as well as the aim/objectives of research is included. A thorough discussion in relation to the significance as well as the aim/objectives of research is included. An adequate discussion in relation to the significance as well as the aim/objectives of research is included An incomplete or irrelevant discussion is included. Selects literature (at leastseven references) that reflects recent developments in the area and emphasizes primary literature (i.e. journal articles containing original research) (2 Marks) Literature selected magnificently reflects recent developments in the area and completely emphasizes primary literature (i.e. journal articles containing original research).    High-quality references. Literature selected clearly reflects recent developments in the area and largely emphasizes primary literature (i.e. journal articles containing original research).    High-quality references.  Literature selected relatively reflects recent developments in the area and generally emphasizes primary literature (i.e. journal articles containing original research).    Good quality references. Literature selected relatively reflects recent developments in the area but hardly emphasizes primary literature (i.e. journal articles containing original research).    The mix of good and poor quality references. Literature selected does not reflect recent developments in the area and does not emphasize primary literature (i.e. journal articles containing original research).    Poor quality references. Identifies gaps in the literature. (4 Marks) Comprehensive knowledge of the topic and in-depth explanation of the issues that are not addressed. Reasonable knowledge of the topic and a comprehensive explanation of the issues that are not addressed. Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that are not addressed. Limited knowledge of the of the topic and a basic explanation of the issues that are not addressed. Fails to satisfy minimum requirements of explaining the issues. Comments on future research directions based on the identified gaps i.e what other research questions arise from the literature. (4 Marks) The proposed future research direction is well formulated and ably answers all the identified gaps. The proposed future direction is adequately formulated and sufficiently answers most of the identified gaps. The proposed future research direction is adequately formulated and answers some of the identified gaps. The proposed future research direction is either not adequately formulated or does not sufficiently answer the identified gaps. The proposed future research direction is  not adequately formulated and does not sufficiently answer the identified gaps Written clearly (with content well organized) (1 Marks) Highly developed skills in expression & presentation of ideas.  Fluent writing style appropriate to assessment task/document type.  Grammar & spelling accurate. Formal English is used throughout. Well developed skills in expression & presentation of ideas.  Fluent writing style appropriate to assessment task/document type.  Grammar & spelling accurate. Mostly uses formal English. Good skills in expression & clear presentation of ideas.  Mostly fluent writing style appropriate to assessment task/document type.  Grammar & spelling contains a few minor errors. More or less uses formal English. Some skills in expression & presentation of ideas.  Meaning apparent, but writing style not always fluent or well organized.  Grammar & spelling contains several careless errors. Hardly uses formal English Rudimentary skills in expression & presentation of ideas.  Not all material is relevant &/or is presented in a disorganised manner.  Meaning apparent, but writing style not fluent or well organized.  Grammar & spelling contains many errors. Does not use formal English. Provides references using APA referencing system including in-text citations. (1 Marks) Faultless referencing, including reference list and in-text citations. Very good referencing, including reference list and in-text citations. Good referencing, including reference list and in-text citations. Evidence of rudimentary referencing skills. Sub-standard referencing. Presentation back to top Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or not referenced). APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link:  http://student.csu.edu.au/study/referencing-at-csu Requirements back to top Please note: Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting. All assessment submission are subject to University regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labeled and referenced.  A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number)
Answered Same DaySep 05, 2020

Answer To: Assessment item 5 back to top Research project (Report) Value: 20% Due Date: 14-Sep-2018 Return...

Amit answered on Sep 11 2020
153 Votes
Full Name :
    
    Student ID :
    
    Subject :
    
    Assignment No :
    
    Due Date :
    
    Lecturer’s Name :
    
Big data security and privacy issues and solutions
Your Name:
Your Email:
College name, University name, Country name
Table of Contents
1.    Abstract    3
2.    Keywords    3
3.    Introduction    3
4.    Security aspects and five V’s of big data technologies    4
5.    Security
and privacy issues with big data technologies    5
6.    Solution to security and privacy issues with big data technologies    6
7.    Conclusion and future recommendations    8
8.    References:    10
1.
2
2. Abstract
The virtual world of connections generates and collects large amount of databases which are considered as big data. Most of the modern sectors of society make use of big data. The provided configurations and effective management of big data makes it popular among modern organizations to use its services. As big data is implemented on large scale so, security and privacy issues can easily arrives. The implementation of SDN and firewalls can make effective and fast controls on all occurred issues.
3. Keywords
Big data, security, privacy, SDN, 5V concepts
4. Introduction
The emerging area which is used to manage the data sets where size of data set is large then the commonly created data set and specific tools are required to manage, analyze, and capture the required data is called big data. It is well known that the sizes of databases are increasing on rapid bases every year. Most of the collected data are unstructured and collected from different sources like images, internet indexing, recordings of multimedia, medical databases; social media etc. Because of IoT implementation in modern days, more attention is gained by big data as increased number of connected devices will generate more data. The increased demand of different organization regarding purchase of additional space for every where access also increased the demand and implementation of big data. Because of this busted wide area, variety of databases and increased volume, the privacy and security issues in big data implementation are increasing very fast [Chen & Zhao, 2012].
The implementation of public cloud for expanding big data makes use of tradition solutions like DMZ and firewalls for improved security solution on private infrastructure of computing. The security functions of big data have to face different issues from operating systems, network domains and used hardware. Thus, in big data environment, the characteristics of SDN are also playing important role to this heterogeneous infrastructure. The abstraction for improved security is included by SDN in big data which maintains effective controls and supervision on deployed system infrastructure of big data. The used switches and physical routers are also act as control programs to take logical controls of big data for solving privacy and security issues. The centralized control provided by SDN makes intelligent management to all the functions required for security of big data [Hashem et al, 2015]. The framework launched by NIST is also providing guidelines to increase the security issues of big data and easily solving the privacy problems with it.
5. Security aspects and five V’s of big data technologies
The connected devices to internet and data sharing with each other are the key elements responsible for increased data volume. The implementation of big data is associated with implementation of cloud. The collected data on cloud, stored data and even processed data is bringing new challenges for information security of big data. The modern organizations are making use of different new parameters like BYOD, so, implementation of traditional security methods like DMZ or firewall will not guaranty...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here