Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

back to top Research project (Report) Value: 20% Due Date: 20-May-2019 Return Date: 13-Jun-2019 Submission method options: Alternative submission method Task back to top In this assessment, you are...

1 answer below »
back to top
Research project (Report)
Value: 20%
Due Date: 20-May-2019
Return Date: 13-Jun-2019
Submission method options: Alternative submission method
Task
ack to top
In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:
· Overview of the technology involved
· Relevant technologies and applications of those technologies
· Highlighting the challenges/problems in your chosen research area
· Identification of any gaps in the literature by:
· discussing areas/issues that you believe have been addressed in the cu
ent literature;
· highlighting areas/issues that have not been addressed or adequately addressed; and
· discussing your view(s) on the issue(s) that you see as being critical.
· Summarize the future research directions based on the identified gaps
To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 5 research articles. Students are encouraged to access such research articles from well known and reputed research portals such as IEEE, ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations. 
 
 
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
· be able to explain the fundamental concepts of cryptographic algorithms.
· be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
· be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
· be able to investigate and justify the use of the access control mechanisms and user authentication processes.
· be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.
This assessment continues links back to assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security.The aim of this task is to help students :
· to demonstrate ability to integrate and apply information from various topics;
· to build an understanding and perspective of cu
ent and emerging topics in Information Security;
· to help the students to formulate their research project in a step by step manner; and
· to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security
 
Marking criteria and standards
ack to top
 
    Assessment criteria
    Assessable Components
    HD
100% - 85%
    DI
84% - 75%
    CR
74% - 65%
    PS
64% - 50%
    FL
49% - 0
    Abstract section
(5 Marks)
     A very concise abstract where the aim of study is perfectly articulated, the central question is precisely formulated,
    A concise abstract  where the aim of study is appropriately articulated, the research question is formulated.
     A concise abstract where the aim of study is relatively articulated, the research question is adequately formulated.
     A concise abstract where the aim of study is articulated, the research question is vaguely formulated.
     Incomplete abstract with no research question identified.
     Introduction section
(5 Marks)
     A comprehensive discussion in relation to the research background as well as the aim/objectives of research is included.
     A highly detailed discussion in relation to the significance as well as the aim/objectives of research is included.
     A thorough discussion in relation to the significance as well as the aim/objectives of research is included.
     An adequate discussion in relation to the significance as well as the aim/objectives of research is included
     An incomplete or i
elevant discussion is included.
    Select literature that reflects recent developments in the area and emphasizes primary literature (i.e. journal articles containing original research)
(2 Marks)
     Literature selected magnificently reflects recent developments in the area and completely emphasizes primary literature (i.e. journal articles containing original research).
    Literature selected clearly reflects recent developments in the area and largely emphasizes primary literature (i.e. journal articles containing original research).
     Literature selected relatively reflects recent developments in the area and generally emphasizes primary literature (i.e. journal articles containing original research)..
     Literature selected relatively reflects recent developments in the area but hardly emphasizes primary literature (i.e. journal articles containing original research).
     Literature selected does not reflect recent developments in the area and does not emphasize primary literature (i.e. journal articles containing original research).
    Identify gaps in the literature.
 
(4 Marks)
    Comprehensive knowledge of the topic and in depth explanation of the issues that are not addressed;
    Reasonable knowledge of the topic and a comprehensive explanation of the issues that are not addressed.
    Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that are not addressed.
    Limited knowledge of the of the topic and a basic explanation of the issues that are not addressed.
    Fails to satisfy minimum requirements of explaining the issues.
    Comment on future research directions based on the identified gaps i.e what other research questions arise from the literature.
(4 Marks)
    The proposed future research direction is well formulated and ably answers all the identified gaps.
    The proposed future direction is adequately formulated and sufficiently answers most of the identified gaps.
    The proposed future research direction is adequately formulated and answers some of the identified gaps.
    The proposed future research direction is either not adequately formulated or does not sufficiently answer the identified gaps.
    The proposed future research direction is  not adequately formulated and does not sufficiently answer the identified gaps
    Be written clearly (with content well organized)
(3 Marks)
    Highly developed skills in expression & presentation of ideas.
Fluent writing style appropriate to assessment task/document type.
Grammar & spelling accurate. Formal English is used throughout.
    Well developed skills in expression & presentation of ideas.
Fluent writing style appropriate to assessment task/document type.
Grammar & spelling accurate. Mostly uses formal English.
    Good skills in expression & clear presentation of ideas.
Mostly fluent writing style appropriate to assessment task/document type.
Grammar & spelling contains a few minor e
ors. More or less uses formal English.
    Some skills in expression & presentation of ideas.
Meaning apparent, but writing style not always fluent or well organised.
Grammar & spelling contains several careless e
ors. Hardly uses formal English
    Rudimentary skills in expression & presentation of ideas.
Not all material is relevant &/or is presented in a disorganised manner.
Meaning apparent, but writing style not fluent or well organised.
Grammar & spelling contains many e
ors. Does not use formal English.
    Provide references (at least three) using APA referencing system including in text citations.
(2 Marks)
    Faultless
eferencing,
including
eference list and in text citations.
High quality
eferences.
    Very good
eferencing,
including
eference list and
in text citations.
High quality
eferences.
    Good referencing,
including
eference list and
in text citations.
Good quality
eferences.
    Evidence of
udimentary
eferencing skills.
Mix of good and
poor quality
eferences.
    Sub-standard
eferencing.
Poor quality
eferences.
 
Presentation
ack to top
The final submission must be in MS Word format using the given template that is available from the subject site under Assessment 5 folder in the Resources section.
Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or unreferenced).
APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link. This also forms a part of the marking ru
ic.http:
student.csu.edu.au/study
eferencing-at-csu
 
Requirements
ack to top
Please note: Assessment MUST be submitted as ONE MS Word file via turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.
All assessment submission are subject to University regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced.
Answered Same Day May 15, 2021

Solution

Amit answered on May 19 2021
155 Votes
Title of the assignment:
Student’s name:
Professor’s name:
Course title:
Date:
Table of Contents
1.    Abstract    3
2.    Introduction    4
3.    Problems with cloud computing    5
4.    Handling methods for critical issues with Cloud computing    7
5.    Challenges with Cloud computing    8
6.    Conclusion and future scope of research    9
7.    References:    10
1. Abstract
From the beginning of internet in 1990 when the connection of computers is allowed to each other, the basic step towards cloud services is started. The cloud services has to travel from parallel computing to distributed computing to grid computing and now finally to cloud computing. The computer science is providing so many opportunities in cloud computing area in modern time. The basic function of cloud computing is resource hiring based on the requirements of any individual or organization. There are so many venders which makes supply of required resources to requesting persons through their already developed setup. It is not possible for each organization to set the costly setup for using any services, so, the cloud based services are easily leased by such organizations [Ali et al, 2015]. The cloud services works with internet, so, the implementation of these services leads to certain challenges and issues. The cloud allows organizations to use the servers from venders and executing operations through vender servers, so, these challenges and issues becomes more complex as the controls of servers is in the hands of venders only. The main advantage with cloud is that client requesting service only makes payments for required services and all maintenance and handling tasks of developed infrastructure are done by the vender. The client even does not have requirement of making installation. Thus, the cloud is one word for all internet based services in modern time. The cloud is moving towards the implementation of social services and their required interaction by creating a new environment with required flexibility, scalability, reliability and availability. But these all services implemented with cloud are internet based and handling these services requires facing different challenges and issues. So, in my presented research work, the faced challenges and occu
ing issues in cloud implementation are mainly identified. The types of clouds and their different services are also examined with different implementation challenges and issues.
2. Introduction
The cloud computing is implemented with different locations which are making use of different components for developing the solid framework of required services setup. The cloud provides an economic framework of low cost to the service users. The small and large organizations both can easily use the required resources from SAAS, PAAS, IAAS and other cloud types. The easy increment in organizational revenue because of low cost on demand services from cloud can easily be archived by both types of organizations. The cloud services help organizations to create digital market so that their production can properly be utilized for end user [Puthal et al, 2015]. The cloud is opening its doors to all users and it is possible that some of the users can have bad intension towards the infrastructure and stored data, so implementation of cloud for any organization or individual requires proper analysis of implementation challenges and related faced issues. The cost effective and easy development options provided by cloud help organizations to maintain their productions. The backbone services delivered by cloud to organizations are very cost effective and in minimum costing the infrastructure o very high cost can be used. The cloud provides best possible solution to client organization and most of the modern organizations are making use of cloud in their regular implementations. The actual implementation of cloud for any organization or individual is very economic in costing. The power consumption of cloud hardware’s is also low and makes it suitable for clients. The application management executed on cloud also requires low cost. Through cloud services the development and production becomes the primary focus of the clients and any wo
ies towards infrastructure development are not considered.
The implementation of cloud
ings mainly the issue of data security. The attacks on CSP...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here