A technical mechanism chapter which identifies and explains


Ask the expert if he/she can do it otherwise i can get 4 marks out 20, as previous assignment i have failed done by ur expert

Problem Statement

Students have the choice to choose a vulnerability or an attack that was identified and reported in the past few years, to talk about. Students are expected to read research and white papers about their elected attack/vulnerability as a part of their preparations towards completing the assignment. Upon satisfactory completion of this assignment you will be able to conduct basic level research in IT security, analyze gathered information, and communicate your findings. To demonstrate your achievement of these goals, you must write a 3,000 word report regarding this vulnerability.

Your report should consist of the following chapters:

1. A proper title which matches the contents of your report.

2. Your name and Deakin student number in the author line.

3. An executive summary which summarizes your findings. (You may find hints on writing good executive summaries from https://unilearning.uow.edu.au/report/4bi1.html.)

4. An introduction chapter which explains the vulnerability, the impact of this vulnerability, the identification of this vulnerability, the context of the vulnerability, and the organization of the rest of your report.

5. A literature review chapter which surveys the latest academic and white papers regarding the selected vulnerabilities. Your review must not simply be a summary of each paper, but rather a deep analysis of the body of work reported in the set of paper. Your aim in this part of the report is to demonstrate deep and thorough understanding of the existing body of knowledge encompassing the vulnerability. (Please read through the hints on this web page before writing this chapter https://www.uq.edu.au/student-services/learning/literature-review.)

6. A technical mechanism chapter which identifies and explains the vulnerable and its source codes, if availabile.

7. A technical demonstration chapter which consists of fully explained screenshots when a successful exploitation of vulnerability was conducted, if applicable.

8. A technical solution chapter which outlines your proposal to deal with this vulnerability. You must prove that your proposal is original.

9. A conclusions chapter which summarizes major findings of the study and indicates future work which should be conducted in the area.

10. A bibliography list of all cited papers and other resources. You must use in-text citations in Harvard style and each citation must correspond to a bibliography entry. There must be no bibliography entries that are not cited in the report. (You should know the contents from this page https://www.deakin.edu.au/students/study-support/referencing/harvard.)

Additionally, on-campus students will present your findings during your weekly practical class in week (The exact time is arranged by your practical tutor.) Off-campus students need to submit powerpoint presentation with voice embedded by the due date with the report.

Request for Solution File

Ask an Expert for Answer!!
Dissertation: A technical mechanism chapter which identifies and explains
Reference No:- TGS01358029

Expected delivery within 24 Hours