Explain the functioning of security services in computing


Infrastructure and security

Learning Outcomes

- Explain the functioning of security services in computing environments and the security issues in mobile and loT computing,
- Describe and review emerging networking technologies

Assignment Details:

This assignment is to produce a report on the security issues that are relevant to the major topic classifications raised in assignment 1 by group members.

In other words, suppose the major topic headings 'Storage/size' and 'Networks/speed' were chosen, then the group should choose one of these, and expand on what kind of security mechanisms are in place. Note that the group members don't have to concentrate on speed or size. It is only the major topic headings that count.

If neither topic appeals, then the group members must email myself or the head tutor for approval for a new topic to be chosen.

The major domains are:
1. Tablets, Smartphones - the mobile aspect (only)
2. Sensor features
3. Compute
4. Storage
5. Operating Systems
6. Networks

Other combinations will be permitted but with prior email permission. In this case, please email me and CC the head tutor and explain which combination you wish to select, and once permission is given, please write this in the report.

Points to consider. in your report there should be at least:
o an introduction, describing the domain you will be discussing about
o at least 5 sections, each describing a particular security aspect
- not an incident or exploit, just an aspect that has affected design
- An example might be that Storage (say, NAS), needs group-based access control, so that the Payroll group only has access to the Payroll data. How would information be stored on NAS devices in order to support this?
Another example might be security at velocity. Data is coming in too fast for rthe usual PKI to be used, so storage, how is that problem dealt with. Sessions? User-based
or group-based? Location-based? IP-based? These all affect the design
- it may help if you think of real-world case-studies
- How does the bureau of meteorology deal with its data?
- Banks?
- Google vision?
o at least two security Incidents one of which is less than 5 years old that deal with the topic chosen.
- a subsection with the name of the exploit is desirable,
- The better-known exploits have distinctive names, as well as a logo. Store an image on one if one exists, but this is not mandatory
- This section is to include at least 3 links to newspaper articles about the exploit.
- This section is also to include at least 2 links to specialist articles that describe the exploit in great detail.
o Proper Referencing. You must cite using 'credible' references. These would include:
- Review articles from well-known magazines (no more than 2 citations from the same article);
- Academic journals or conference papers
(can be found using Google Scholar);
- NOT Wikipedia !!
- NOT blogs or videos (unless clearly from credible organisations, such as the manufacturer, a security organisation a university or similar independent body No personal blogs), although, like Wikipedia, there is nothing wrong with using these to find original, or more credible sources.

- For example, icrypto-gram' blog is a great initial source, but with links to the originals.
- Footnotes are not acceptable as the sole form of referencing
- If you want to use them, then say something like '2. Brainstorm logo is taken from [3]*, where 13] is reference 3 in your list.
Submission file format:
- PDF, and all references are to have clickable links to their sources.
Submission Size
- up to 10 pages of printed text, using size 12 font and including figures and tables Content Format
- Title page is optional, but it must have:
o Snappy Title (think of something that grabs the attention);
o Abstract: A single paragraph (around 100 words summarising your findings)immediately following the title;
o Student Names;
o Student IDs; Group ID
o Course Title and Semester/Year;
o Images of the 5 items with options which should include name, company and model numbers.

Solution Preview :

Prepared by a verified Expert
Dissertation: Explain the functioning of security services in computing
Reference No:- TGS02811334

Now Priced at $100 (50% Discount)

Recommended (92%)

Rated (4.4/5)