0% found this document useful (0 votes)
21 views5 pages

ITC595 - Information Security - Assessment Item 5

Uploaded by

vinothas.97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

ITC595 - Information Security - Assessment Item 5

Uploaded by

vinothas.97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

ITC595 - Information Security- Assessment item 5

Research project (Report)

Task
In this assessment, you are required to provide a complete report of your research project, that
you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:
• Overview of the technology involved
• Relevant technologies and applications of those technologies
• Highlighting the challenges/problems in your chosen research area
• Identification of any gaps in the literature by: discussing areas/issues that you believe have
been addressed in the current literature; highlighting areas/issues that have not been addressed or
adequately addressed; and discussing your view(s) on the issue(s) that you see as being critical.
• Summarize the future research directions based on the identified gaps

To accomplish the above, you are expected to read and critically evaluate recent research in your
selected research area by citing a minimum of 5 research articles. Students are encouraged to
access such research articles from well-known and reputed research portals such as IEEE, ACM,
Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable
citations.
Rationale
This assessment task will assess the following learning outcome/s:
• be able to justify security goals and the importance of maintaining the secure computing
environment against digital threats.
• be able to explain the fundamental concepts of cryptographic algorithms.
• be able to examine malicious activities that may affect the security of a computer program and
justify the choice of various controls to mitigate threats.
• be able to compare and contrast the security mechanisms of a trusted operating system with
those used in a general purpose operating system.
• be able to investigate and justify the use of the access control mechanisms and user
authentication processes.
• be able to compare and contrast foundational security policies and models that deal with
integrity and confidentiality.

This assessment continues links back to assessment 3 where students initiated their research
project by selecting a research topic in an emerging area of information security. The aim of this
task is to help students:
• To demonstrate ability to integrate and apply information from various topics;
• To build an understanding and perspective of current and emerging topics in
Information Security;
• To help the students to formulate their research project in a step by step manner; and
• To build generic skills including, critical thinking, analysis, problem solving in the context of
Information Security
Marking criteria and standards
Presentation
The final submission must be in MS Word format using the given template that is available from
the subject site under Assessment 5 folder in the Resources section.
Care must be taken to avoid direct quotes from sources. No marks will be awarded for any
answer containing more than 10% direct quotes (referenced or unreferenced).
APA reference style must be used throughout the document with the bibliography at the end of
the document. In-text citations should also follow APA style. APA referencing guide can be
accessed via the following link. This also forms a part of the marking rubric.
http://student.csu.edu.au/study/referencing-at-csu

Requirements
Please note: Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not
submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using a
MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word
format in order to be marked. Allowances will not be made for any loss of information, diagrams
or images as a result of the re-formatting.
All assessment submission are subject to University regulations for academic misconduct
(including plagiarism). As such, any text adapted from any source must be clearly labelled and
referenced.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy