In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects: Overview of...

1 answer below »

In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:



  • Overview of the technology involved

  • Relevant technologies and applications of those technologies

  • Highlighting the challenges/problems in your chosen research area

  • Identification of any gaps in the literature by:

    • discussing areas/issues that you believe have been addressed in the current literature;

    • highlighting areas/issues that have not been addressed or adequately addressed; and

    • discussing your view(s) on the issue(s) that you see as being critical.



  • Summarize the future research directions based on the identified gaps


To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing aminimumof 5 research articles. Students are encouraged to access such research articles from well known and reputed research portals such as IEEE, ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations.



Rationale


back to top

This assessment task will assess the following learning outcome/s:



  • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

  • be able to explain the fundamental concepts of cryptographic algorithms.

  • be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.

  • be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.

  • be able to investigate and justify the use of the access control mechanisms and user authentication processes.

  • be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.


This assessment continues links back to assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security.The aim of this task is to help students :



  • to demonstrate ability to integrate and apply information from various topics;

  • to build an understanding and perspective of current and emerging topics in Information Security;

  • to help the students to formulate their research project in a step by step manner; and

  • to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security







Marking criteria and standards


back to top









































































Assessment criteria
Assessable ComponentsHD100% - 85%DI84% - 75%CR74% - 65%PS64% - 50%FL49% - 0

Abstract section


(5 Marks)


A very concise abstract where the aim of study is perfectly articulated, the central question is precisely formulated,A concise abstract where the aim of study is appropriately articulated, the research question is formulated.A concise abstract where the aim of study is relatively articulated, the research question is adequately formulated.A concise abstract where the aim of study is articulated, the research question is vaguely formulated.Incomplete abstract with no research question identified.

Introduction section


(5 Marks)


A comprehensive discussion in relation to the research background as well as the aim/objectives of research is included.A highly detailed discussion in relation to the significance as well as the aim/objectives of research is included.A thorough discussion in relation to the significance as well as the aim/objectives of research is included.An adequate discussion in relation to the significance as well as the aim/objectives of research is includedAn incomplete or irrelevant discussion is included.

Select literature that reflects recent developments in the area and emphasizes primary literature (i.e. journal articles containing original research)


(2 Marks)


Literature selected magnificently reflects recent developments in the area and completely emphasizes primary literature (i.e. journal articles containing original research).Literature selected clearly reflects recent developments in the area and largely emphasizes primary literature (i.e. journal articles containing original research).Literature selected relatively reflects recent developments in the area and generally emphasizes primary literature (i.e. journal articles containing original research)..Literature selected relatively reflects recent developments in the area but hardly emphasizes primary literature (i.e. journal articles containing original research).Literature selected does not reflect recent developments in the area and does not emphasize primary literature (i.e. journal articles containing original research).
Identify gaps in the literature.(4 Marks)Comprehensive knowledge of the topic and in depth explanation of the issues that are not addressed;Reasonable knowledge of the topic and a comprehensive explanation of the issues that are not addressed.Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that are not addressed.Limited knowledge of the of the topic and a basic explanation of the issues that are not addressed.Fails to satisfy minimum requirements of explaining the issues.
Comment on future research directions based on the identified gaps i.e what other research questions arise from the literature.
(4 Marks)
The proposed future research direction is well formulated and ably answers all the identified gaps.
The proposed future direction is adequately formulated and sufficiently answers most of the identified gaps.
The proposed future research direction is adequately formulated and answers some of the identified gaps.
The proposed future research direction is either not adequately formulated or does not sufficiently answer the identified gaps.
The proposed future research direction is not adequately formulated and does not sufficiently answer the identified gaps

Be written clearly (with content well organized)


(3 Marks)


Highly developed skills in expression & presentation of ideas.
Fluent writing style appropriate to assessment task/document type.
Grammar & spelling accurate. Formal English is used throughout.
Well developed skills in expression & presentation of ideas.
Fluent writing style appropriate to assessment task/document type.
Grammar & spelling accurate. Mostly uses formal English.
Good skills in expression & clear presentation of ideas.
Mostly fluent writing style appropriate to assessment task/document type.
Grammar & spelling contains a few minor errors. More or less uses formal English.
Some skills in expression & presentation of ideas.
Meaning apparent, but writing style not always fluent or well organised.
Grammar & spelling contains several careless errors. Hardly uses formal English
Rudimentary skills in expression & presentation of ideas.
Not all material is relevant &/or is presented in a disorganised manner.
Meaning apparent, but writing style not fluent or well organised.
Grammar & spelling contains many errors. Does not use formal English.
Provide references (at least three) using APA referencing system including in text citations.(2 Marks)Faultlessreferencing,includingreference list and in text citations.High qualityreferences.Very goodreferencing,includingreference list andin text citations.High qualityreferences.Good referencing,includingreference list andin text citations.Good qualityreferences.Evidence ofrudimentaryreferencing skills.Mix of good andpoor qualityreferences.Sub-standardreferencing.Poor qualityreferences.


Presentation


back to top

The final submission must be in MS Word format using the given template that is available from the subject site under Assessment 5 folder in the Resources section.


Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or unreferenced).




APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link. This also forms a part of the marking rubric.http://student.csu.edu.au/study/referencing-at-csu






Requirements


back to top

Please note:AssessmentMUSTbe submitted asONEMS Word file via turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances willnotbe made for any loss of information, diagrams or images as a result of the re-formatting.


All assessment submission are subject to University regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced.

Answered Same DayMay 19, 2021

Answer To: In this assessment, you are required to provide a complete report of your research project, that you...

Ankit answered on May 20 2021
146 Votes
Student Name
Student ID
Biometrics for authentication
Abstract
Biometric authentication is basic
ally the technique of verifying user identity by utilizing their distinct features or measurements of their body. For this, user needs to logging in a software or application. Currently the various biometric technologies are using in various systems such as fingerprint scanning for airport security, iris recognition for smart devices etc.
During the earlier times, biometric technology was very costly to install and it was used by limited firms such as government firms, and air force industry. The mode of biometric authentication system was fingerprint scanning only. But now biometric technologies are used in every field and technology is not so expensive to deploy. There are different modes of authentication to be used.
The term biometrics originates from the Greek word ‘bios’ which means life, and the term 'metrikos', means estimating. There is various Biometric technology applications...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here