MITS5004 IT Security Assignment 2 Research Report MITS5004 Assignment 2 Copyright © XXXXXXXXXXVIT, All Rights Reserved. 2 NOTE: This Document is used in conjunction with Assessment 1 [Case Studies &...

2 answer below »
i want to have three different copies of assignment on three different topic


MITS5004 IT Security Assignment 2 Research Report MITS5004 Assignment 2 Copyright © 2015-2018 VIT, All Rights Reserved. 2 NOTE: This Document is used in conjunction with Assessment 1 [Case Studies & Presentation] and Assessment 2 [Research Study] in the Unit Guide [MITS5004 IT Security-Unit Guide] Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student presentation skills and to give students experience in researching a topic and writing a report relevant to the Unit of Study subject matter. INSTRUCTIONS Assignment 2 - Research Study - 10% (Due Session 9) Individual Assignment For this component you will write a report or critique on the paper you chose from Assignment 1. Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises. Citation of sources is mandatory and must be in the IEEE style. Your report or critique must include: Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID. Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs). Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study. MITS5004 Assignment 2 Copyright © 2015-2018 VIT, All Rights Reserved. 3 Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new’ material that was not discussed in the body of the paper. (One or two paragraphs) References: A list of sources used in your text. They should be listed alphabetically by (first) author’s family name. Follow the IEEE style. The footer must include your name, student ID, and page number. Note: reports submitted on papers which are not approved or not the approved paper registered for the student will not be graded and attract a zero (0) grade. What to Submit Submit your report to the Moodle drop-box for Assignment 2. Note that this will be a turn-it-in drop box and as such you will be provided with a similarity score. This will be taken into account when grading the assignment. Note that incidents of plagiarism will be penalized. If your similarity score is high you can re-submit your report, but re- submissions are only allowed up to the due date. If you submit your assignment after the due date and time re-submissions will not be allowed. Please Note: All work is due by the due date and time. Late submissions will be penalized at the rate of 10% per day including weekends.
Answered Same DaySep 26, 2021MITS5004

Answer To: MITS5004 IT Security Assignment 2 Research Report MITS5004 Assignment 2 Copyright © XXXXXXXXXXVIT,...

Roshan answered on Sep 29 2021
152 Votes
Name:
ID:
1
IT Security
Data security
Author's Name: 1). Deyan Chen, Hong Zhao
2). R. Velumadhava Rao, K. Selvamani
3). Rachna Arora, Anshu Parashar
Name:
ID:
Introduction: The s
ecurity of data is very important for small as well as large organisations. Not only for organisations but also for banking, IT sector, education, government, etc. Data security provide the protective digital privacy to protect database, websites and if any fraud used to access the computer and it also protects data from corruption. Nowadays, Cloud Computing is growing very fastly and used by many firms and industries. Without spending a lot of expenses the client get benefit of cloud computing services. Most of the organisations not only store their data on cloud but also takes various advantages of cloud services. Cloud is composed of Software, Hardware, storage, interfaces and services that provide ease of doing computing, access of infrastructure, computing power regardless of location that means it can be accessible from anywhere if internet connectivity is there. Cloud uses server to store their data. The best example of cloud storage is Google drive which provide memory to store the data. This report reflects that how cloud computing provides different services, the issue of security of data in cloud, the challenges of data security and its solution in cloud computing.
CLOUD COMPUTING:
Cloud Computing has recently emerged as a highly successful alternative IT paradigm. Cloud provides large-scale data across the globe to meet the Cloud customers’ compute, storage, and network resource demands and also provides on demand availability of computer system resources. IT organizations use cloud computing on very large scale to store and retrieve data. The best example of cloud is Google drive and many more software such as iCloud, Microsoft Azure, cloud foundry, G suite, etc. With the advances in cloud computing and the capabilities of mobile devices, the communications capabilities of mobile devices to establish high-speed connections to vast computational resources located in the cloud. While the execution scheme based on this mobile-cloud collaboration opens the door to many applications that can tolerate response times on the order of seconds and minutes, it proves to be an inadequate platform for running applications demanding real-time response within a fraction of a second.
In Cloud, applications and its data are created and maintained virtually for the users and only accessible by a particular Cloud’s software ex. iCloud, G Suite, etc. Before 2005, users imagined renting resources, data and software in order to process, run and enhance their devices and software’s. Now, it is possible to rent any required resources users like so that this dream is now realized. In general, Cloud has three basic characteristics:
1. Scalability: Cloud options to use scalable architecture. Scalability means that hardware units are added to bring more resources to the Cloud system. Scalability issues are evaluated from the Infrastructure as a Service (IaaS) and the Platform as a Service (PaaS) view point, as they deal with different functions.
2. Availability: The services like storage of data, platform and contents are...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here