IT Security代写 | COS30015 IT Security Assignment 1
本次澳洲代写是IT安全的一个assignment
Introduction:
In recent decades, the development of Internet and communications technologies has
introduced a virtual world to everyone’s daily life. In this virtual world, people are able to do
a large number of activities similar in the real world. Especially with the growth of Internet of
Things (IoT) and 5G, the field of IT security is becoming more important. To help you better
understand the field, you are required to write a literature review on any one of the following
related IT security topics, either from the attack or defence view. The literature review should
consist of 2500-4000 words (at least 6 pages, single spaced, 12pt fonts, on a normal A4
paper).
Topics:
Choose One only:
• Attacks:
o Advanced persistent threat
o Insider threat
o Emerging Attacks on Blockchain or the defences
o Emerging Attacks on IoTs or the defences
o Emerging Attacks on AI or the defences
o Backdoor attacks or the defences
o Denial of service or Distributed Denial of service
o Eavesdropping
o Exploits
o Malware
o Spam
o Phishing
o Ransomware
o Vulnerabilities
• Defences:
o Access control
o Application security
o Secure coding
o Authentication
o Multi-factor authentication
o Authorization
o Data-centric security
o Encryption
o Intrusion detection/prevention system
o Mobile security
o cloud security
• or you are allowed to choose your own IT security topic even it is not listed above
Amount of work:
Each student should spend at least 30 hours working on the assignment. Documentary
evidence of the time taken may be requested by the convenor after submission, so log books,
repositories should be maintained. The literature review should consist of 2500-4000 words
(at least 6 pages, single spaced, 12pt fonts, on a normal A4 paper).
Marks will be allocated depending on the amount of original work submitted. 0 Mark will be
given for plagiarized and/or un-attributed work. eForensic examination of the assignment will
be carried out to verify its authenticity.