MITS4004 IT Networking and Communication Assignment 1 Reviewing Journal Article February 2020 MITS4004 Assignment 1: ARTICLE REVIEW Copyright © 2020 VIT, All Rights Reserved....

1 answer below »
I have attached assignment


MITS4004 IT Networking and Communication Assignment 1 Reviewing Journal Article February 2020 MITS4004 Assignment 1: ARTICLE REVIEW Copyright © 2020 VIT, All Rights Reserved. _____________________________________________________________________________ This assessment item relates to the unit learning outcomes as in the unit descriptors. LO3: Critically analyse specific processes and functions that apply to a layered network model, with specific reference to TCP/IP; Subnet a network using multi-level subnetting and provide a subnetted IP design based on a given topology or business profile LO4: Apply the advanced knowledge gained to reflect on the security requirements of a network. Evaluate the issues that surround network applications such as quality of service (QoS) and network performance analysis. Be adaptable to changing requirements. Task THE JOURNAL ARTICLE REVIEW: The purpose of this assignment is to help you understand how research is conducted and reported in Information Technology related fields. You are asked to read a peer-reviewed article from a scholarly journal in the field of Advance Networking and Communication Systems. Articles of this type will typically report on original research or replications of previously conducted experiments, or they will be literature reviews in which the author(s) present the results of a literature search on a specific topic. In the latter case, the article will usually be a dissertation on the most current thinking on a specific topic. Task1: Locate an appropriate article • You can download any per reviewed journal from the field of Information Technology, Networking and Advance Communication Systems that includes security. • You should limit your search to: Full text Scholarly (peer reviewed) journals Published in the past 5 years Or, you can come and see your lecturer during office hours, or during consultation hours. Task 2: Summarize and discuss the content of article. Task 3: Explain and critique the methods used and/or the findings presented. Task 4: Conclude with your opinion. ________________________________________________________________________________ Submission Criteria: The report should have a consistent, professional, and well-organized appearance with 12- point font size and at least single line spacing with appropriate section headings. 1. Your report should include the following: ➢ The word limit of the report is 1500 words. ➢ The cover page must identify student name and the Student ID, unit details, assignment details and lecturer details. Due Date: Session 6 Weightage: 10% Individual Assignment. MITS4004 Assignment 1: ARTICLE REVIEW Copyright © 2020 VIT, All Rights Reserved. Assignment details: Author(s). Article title. Journal name, volume, number, pages, year of publication. Example: G. B. Varghese and R. Buyya, ‘‘Next generation cloud computing: New trends and research directions,’’ Future Gener. Comput. Syst., vol. 79, pp. 849–861, Feb. 2018. ➢ Summarize and discuss the content of article. ➢ Explain and critique the methods used and/or the findings presented. ➢ Offer your opinion on the value of the study. 2. In-text referencing in IEEE style must be cited in the text of the report and listed appropriately at the end in a reference list. 3. The report must be submitted in soft (electronic) copy as a Microsoft Word document on the LMS in Turnitin dropbox. Assignments submitted on the LMS will only be accepted. 4. Late penalty applies on late submission, 10% per day would be deducted. 5. The assignments will go through Turnitin and plagiarism penalty will be applied. __________________________________________________________________________________ Marking Guide: 50 Marks Task Description Marks Task 1 Locate an appropriate article. 5 Task 2 Summarize and discuss the content of article. 10 Task 3 Explain and critique the methods used and/or the findings presented. 10 Task 4 Conclude with your opinion. 20 Report Layout The report style, language and structure and reference should be appropriate. 5 Total 50
Answered Same DayApr 08, 2021MITS4004

Answer To: MITS4004 IT Networking and Communication Assignment 1 Reviewing Journal Article February 2020...

Amit answered on Apr 10 2021
150 Votes
Student’s name:
Student ID:
Unit details: MITS 4004 (IT networking and Communication)
Title of the assignment and other details: Assignment – 1(Reviewing Journal Article)
Lecturer name and other details:
Date: 4/10/2020
Table of Contents
1.    Assignment details:    3
2.    Summary and main discussion for t
his selected article    3
3.    Analysis of used methods and other important findings    4
4.    Conclusion in my opinion    7
5.    References:    8
1. Assignment details:
Terrill, J.O., Cross, T.J., Davis, S.M. and Zhang, Q, Computer network security system. U.S. Patent 10,122,760, Drawbridge Networks Inc, November 2018.
2. Summary and main discussion for this selected article
The network security becomes the essential requirements in YSA and other countries. The central control to deployed communication framework is essential requirements of modern networks. Each newly developed connection to the existing network makes requirement of following the defined communication policy. The enhanced authentication to deployed network can provide the approval or deny the communication request by any new host machine. The authentication capabilities set over the network implementation are the key elements which defines the security implications for all associated users. For protection of set network, the implemented security framework manages the interfaces of users, defines rules for their connections, defines rules for their database access, and defines the status of used database and other events. This complete mechanism of network security is based on the request and response from client and authentication system. The role of background processes becomes important as these processes are defining the possible attacks to set network. The network attacks and compromised security can be because of different reasons like security compromises, unnecessary privileges and data infiltration. The implementation of proper network security can prevent the attacks on their initial stage. There are different tools and other important applications which can prevent the occurrences of possible network attacks and can effectively improve the security of complete deployed network.
The technical flow because of deployed applications can cause easy compromise to network security. The possible attacks because of compromise are considered as zero day attacks and direct attack on the network server with phishing can be conducted by attackers. The malicious code making possible attack to network infrastructures are mainly used by attackers for performing such attacks. The remote control of complete network is mainly over taken by the attackers by performing such attacks. It is a challenging task to prevent all possible compromises for the used applications because the complete implementation of network makes use of different applications and failure of any one application can cause such possible attacks. The implementation of firewall and other prevention systems mainly used for intrusion detection can prevent such attacks. Not allowing download permission is also an...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here