Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment item 5 back to top Research project (Report) Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: XXXXXXXXXXwords (Excluding references) Submission method options: Alternative...

1 answer below »
Assessment item 5
ack to top
Research project (Report)
Value: 20%
Due Date: 14-Sep-2018
Return Date: 09-Oct-2018
Length:  XXXXXXXXXXwords (Excluding references)
Submission method options: Alternative submission method
Task
ack to top
In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:
· Overview of the topic
· Relevant technologies and applications of those technologies
· Highlighting the challenges/problems in your chosen research area
· Identification of any gaps in the literature by:
· discussing areas/issues that you believe have been addressed in the cu
ent literature;
· highlighting areas/issues that have not been addressed or adequately addressed; and
· discussing your view(s) on the issue(s) that you see as being critical.
· Summarize the future research directions based on the identified research gaps
To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 7 research articles. Students are encouraged to access such research articles from well-known and reputed research portals such as IEEE, ACM, Springer, Science Direct etc. Please note Wikipedia and general blogs will not be considered as acceptable citations.
Your report should include the following sections. A template will also be made available in the Resources section of your subject Interact2 site.
Abstract (As submitted for Assessment 3)
Your abstract should
iefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important.
Keywords
Three to seven keywords representing the main content of the report.
Introduction
The Introduction section should explain the background to the report, its aims, a summary of the relevant existing literature and the issue/issues under discussion.
Main text
This should contain the body of the report and should be
oken into appropriate subsections with short, informative headings and sub-headings.
Conclusions
This should clearly mention the main conclusions and include an explanation of their relevance or importance to the field.
References
List the references used in your research.
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
· be able to explain the fundamental concepts of cryptographic algorithms.
· be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
· be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
· be able to investigate and justify the use of the access control mechanisms and user authentication processes.
· be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.
This assessment continues from/links back to Assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security. The aim of this task is to help students :
· to demonstrate the ability to integrate and apply information from various topics;
· to build an understanding and perspective of cu
ent and emerging topics in Information Security;
· to help the students to formulate their research project in a step by step manner; and
· to build generic skills including, critical thinking, analysis, problem-solving in the context of Information Security
Marking criteria and standards
ack to top
    Assessment criteria
    Assessable Components
    HD
100% - 85%
    DI
84% - 75%
    CR
74% - 65%
    PS
64% - 50%
    FL
49% - 0
    Abstract
(5 Marks)
    A very concise abstract where the aim of the study is perfectly articulated, the central question is precisely formulated,
    A concise abstract where the aim of the study is appropriately articulated, the research question is formulated.
    A concise abstract where the aim of the study is relatively articulated, the research question is adequately formulated.
    A concise abstract where the aim of the study is articulated, the research question is vaguely formulated.
    Incomplete abstract with no research question identified.
    Introduction and background
(3 Marks)
    A comprehensive discussion in relation to the research background as well as the aim/objectives of research is included.
     A highly detailed discussion in relation to the significance as well as the aim/objectives of research is included.
    A thorough discussion in relation to the significance as well as the aim/objectives of research is included.
    An adequate discussion in relation to the significance as well as the aim/objectives of research is included
    An incomplete or i
elevant discussion is included.
    Selects literature (at leastseven references) that reflects recent developments in the area and emphasizes primary literature (i.e. journal articles containing original research)
(2 Marks)
    Literature selected magnificently reflects recent developments in the area and completely emphasizes primary literature (i.e. journal articles containing original research).
 
 High-quality references.
    Literature selected clearly reflects recent developments in the area and largely emphasizes primary literature (i.e. journal articles containing original research).
 
 High-quality references.
     Literature selected relatively reflects recent developments in the area and generally emphasizes primary literature (i.e. journal articles containing original research).
 
 Good quality references.
    Literature selected relatively reflects recent developments in the area but hardly emphasizes primary literature (i.e. journal articles containing original research).
 
 The mix of good and poor quality references.
    Literature selected does not reflect recent developments in the area and does not emphasize primary literature (i.e. journal articles containing original research).
 
 Poor quality references.
    Identifies gaps in the literature.
(4 Marks)
    Comprehensive knowledge of the topic and in-depth explanation of the issues that are not addressed.
    Reasonable knowledge of the topic and a comprehensive explanation of the issues that are not addressed.
    Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that are not addressed.
    Limited knowledge of the of the topic and a basic explanation of the issues that are not addressed.
    Fails to satisfy minimum requirements of explaining the issues.
    Comments on future research directions based on the identified gaps i.e what other research questions arise from the literature.
(4 Marks)
    The proposed future research direction is well formulated and ably answers all the identified gaps.
    The proposed future direction is adequately formulated and sufficiently answers most of the identified gaps.
    The proposed future research direction is adequately formulated and answers some of the identified gaps.
    The proposed future research direction is either not adequately formulated or does not sufficiently answer the identified gaps.
    The proposed future research direction is  not adequately formulated and does not sufficiently answer the identified gaps
    Written clearly (with content well organized)
(1 Marks)
    Highly developed skills in expression & presentation of ideas.
 Fluent writing style appropriate to assessment task/document type.
 Grammar & spelling accurate. Formal English is used throughout.
    Well developed skills in expression & presentation of ideas.
 Fluent writing style appropriate to assessment task/document type.
 Grammar & spelling accurate. Mostly uses formal English.
    Good skills in expression & clear presentation of ideas.
 Mostly fluent writing style appropriate to assessment task/document type.
 Grammar & spelling contains a few minor e
ors. More or less uses formal English.
    Some skills in expression & presentation of ideas.
 Meaning apparent, but writing style not always fluent or well organized.
 Grammar & spelling contains several careless e
ors. Hardly uses formal English
    Rudimentary skills in expression & presentation of ideas.
 Not all material is relevant &/or is presented in a disorganised manner.
 Meaning apparent, but writing style not fluent or well organized.
 Grammar & spelling contains many e
ors. Does not use formal English.
    Provides references using APA referencing system including in-text citations.
(1 Marks)
    Faultless
eferencing,
including
eference list and in-text citations.
    Very good
eferencing,
including
eference list and
in-text citations.
    Good referencing,
including
eference list and
in-text citations.
    Evidence of
udimentary
eferencing skills.
    Sub-standard
eferencing.
Presentation
ack to top
Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or not referenced).
APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link:  http:
student.csu.edu.au/study
eferencing-at-csu
Requirements
ack to top
Please note: Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.
All assessment submission are subject to University regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labeled and referenced. 
A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number)
Answered Same Day Sep 05, 2020

Solution

Amit answered on Sep 11 2020
154 Votes
Full Name :
    
    Student ID :
    
    Subject :
    
    Assignment No :
    
    Due Date :
    
    Lecturer’s Name :
    
Big data security and privacy issues and solutions
Your Name:
Your Email:
College name, University name, Country name
Table of Contents
1.    Abstract    3
2.    Keywords    3
3.    Introduction    3
4.    Security aspects and five V’s of big data technologies    4
5.    Security and privacy issues with big data technologies    5
6.    Solution to security and privacy issues with big data technologies    6
7.    Conclusion and future recommendations    8
8.    References:    10
1.
2
2. Abstract
The virtual world of connections generates and collects large amount of databases which are considered as big data. Most of the modern sectors of society make use of big data. The provided configurations and effective management of big data makes it popular among modern organizations to use its services. As big data is implemented on large scale so, security and privacy issues can easily a
ives. The implementation of SDN and firewalls can make effective and fast controls on all occu
ed issues.
3. Keywords
Big data, security, privacy, SDN, 5V concepts
4. Introduction
The emerging area which is used to manage the data sets where size of data set is large then the commonly created data set and specific tools are required to manage, analyze, and capture the required data is called big data. It is well known that the sizes of databases are increasing on rapid bases every year. Most of the collected data are unstructured and collected from different sources like images, internet indexing, recordings of multimedia, medical databases; social media etc. Because of IoT implementation in modern days, more attention is gained by big data as increased number of connected devices will generate more data. The increased demand of different organization regarding purchase of additional space for every where access also increased the demand and implementation of big data. Because of this busted wide area, variety of databases and increased volume, the privacy and security issues in big data implementation are increasing very fast [Chen & Zhao, 2012].
The implementation of public cloud for expanding big data makes use of tradition solutions like DMZ and firewalls for improved security solution on private infrastructure of computing. The security functions of big data have to face different issues from operating systems, network domains and used hardware. Thus, in big data environment, the characteristics of SDN are also playing important role to this heterogeneous infrastructure. The abstraction for improved security is included by SDN in big data which maintains effective controls and supervision on deployed system infrastructure of big data. The used switches and physical routers are also act as control programs to take logical controls of big data for solving privacy and security issues. The centralized control provided by SDN makes intelligent management to all the functions required for security of big data [Hashem et al, 2015]. The framework launched by NIST is also providing guidelines to increase the security issues of big data and easily solving the privacy problems with it.
5. Security aspects and five V’s of big data technologies
The connected devices to internet and data sharing with each other are the key elements responsible for increased data volume. The implementation of big data is associated with implementation of cloud. The collected data on cloud, stored data and even processed data is
inging new challenges for information security of big data. The modern organizations are making use of different new parameters like BYOD, so, implementation of traditional security methods like DMZ or firewall will not guaranty...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here