Csi6116 network security - edith cowan university - the


Network Security Academic Paper

Task

a) Research the area for a suitable topic of interest in the context of Network Security. This is to help you focus and scope your research to a specific area for the paper.

Draft an initial Abstract and submit to the lecturer before the deadline for Milestone 1. This will help you obtain feedback and direction on how to proceed.You will need approval before proceeding.

The abstract should be 250-500 words in length. Please note, this abstract is not the same as the one you will have in the final paper. This is more like an outline of what you propose to research for the paper.

Abstract Details

The abstract is a short document consisting of:
- Title of the paper
- No more than 300 words describing what you will cover in your paper.

Fictional Example:

Title: The forensic challenges of umapolophous encryption
Abstract: Today the biggest challenge that we face is the wide-spread use of umapolophousencryption in mobile devices. This has prompted several forensic challenges in the acquisition of evidence during crime investigations by law enforcement. There growing consensus in the forensic community is to force manufacturers of mobile devices to standardise the umapolophousProtocols A1.645 and publish as an open standard. This paper discusses challenges faced by law enforcement and potential solutions.

b) Your paper should be of publication quality. The following are specific things you should be aware of:
i. Broad coverage of the research topic.
ii. Use of authoritative sources for references, including: books, journals, conference proceedings, whitepapers (technology vendors), technical blogs and articles (reputed and established in the area of research). This also means the proper referencing.
iii. Flow of ideas and arguments.
iv. Use of tables and figures to present relevant information.
v. Use of language (grammar, spelling, and punctuation).
vi. Consistent formatting. The following is a format you may use (scroll to bottom of the page and use the TEMPLATE provided):

c) Your paper should cover the following areas:
i. Background: The major concepts and related technologies in both Network Security and AI must be listed and described with some historical perspective of how/why they first came to be. Your reflection on how these concepts/technologies are related (if any) is desired. Do not address these as two separate things, i.e. Network Security and AI in combination defines the context of the paper.

ii. Offensive and/or Defensive AI:Make sure you define key concepts here, i.e. what do you consider as Offensive and/or Defensive AI in Network Security? Please note, you may address both, but you are only required to choose one of these.
- If you choose to discuss about Offensive AI, then provide countermeasures to defend the network from these.
- If you choose discuss Defensive AI, then provide the threats these techniques will defend the network against.
- The most recent developments (i.e. state-of-the-art) must be described. Any similarities, differences, advantages, and/or disadvantages must be contrasted.
- Critical analysis, i.e. in addition to restating what the literature has provided, your own thoughts and reflection on the issues based on fac0ts is encouraged.

iii. Current and future challenges: What challenges stakeholders face due to offensive/defensive AI presently and potentially in the future? What are the consequences due to these challenges for Network Security? Critical analysis and proposing potential solutions for these challenges is encouraged.

iv. Ethical issues:What are the ethical issues that arise due to the use of offensive/defensive AI in Network Security? Describe these with suitable examples of previous incidents or cases. Critical analysis of these issues is encouraged.

d) Send your first draft as per Milestone 2 for feedback. This will not be assessed but strongly recommended. Feedback will be provided with 2 working days. Any major issues will be identified and broad comments will be provided on how to improve your paper. Do not request for any potential marks at this stage.

e) Only submit in Word document format for feedback and final submission.

f) Make sure you submit on time as per Milestone 3.

g) Refer to the marking criteria in Section 4 to find out how you can meet the expected requirements of the assessment.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Csi6116 network security - edith cowan university - the
Reference No:- TGS02903652

Expected delivery within 24 Hours