IntroductionThis assignment is about investigating a topic relating to networks or security. There is a range of topics to choose from in different areas that relate to the content of this unit and its extended field of interest.Assignment SpecificationThis assignment needs to be completed as an individual, and will extend beyond just the writing of an assignment, to also undertaking peer marking to facilitate learning about multiple topics.Once we have read the available topics, our next step is to login to the peer assessment tool which will be available at the start of week 2 and select the topic. There will be limited numbers in each topic to ensure a spread of topics across the class. But, once you have selected a topic, and have selected it on, it is time to get busy working on the assignment. It is vital to official select the topic before you write it.This is a research assignment, and as such you are expected to read a range of content on your topic, and distil it down to your thoughts on the topic. This means putting content into your own words and citing where content has come from. A range of different sources are expected, including academic sources. Most academic sources will likely be peer-reviewed articles that have been published in Journals or Conferences, although other sources are permitted (such as books, and government / standards bodies documents). All source material must be cited and then be listed in a references section at the end of the assignment. Correctly citing and referencing the content you have used makes up a significant part of your final mark.You are required to use the Harvard referencing style which a short description of can be found by following the link below. https://utas.libguides.com/referencing/HarvardThis assignment, but not including the reference list. It may contain diagrams and figures.Topic List Choose one of the following 5 topics:
Blockchain is currently one of the most loaded buzzwords within the IT
industry due to the wealth creation of cryptocurrencies. Discuss the technology and the role it can have in other areas beyond currency.
Discuss the possible security implications in the current widespread
adoption of IoT devices globally.3. Earlier this year a data breach occurred at a company called PageUp that affected the University of Tasmania. Discuss the responsibilities of companies in the event of a data breach in relation to the Federal Data Breach Notification (NDB) scheme.
Many websites and other network services in recent times increased their usage of second factor authentication. Describe how this can mitigate the risks present in password only systems.
Describe the concept of a Man-In-The-Middle attack, and then describe the
main countermeasure used on the web to mitigate the risk of such an attack.Note on Plagiarism Plagiarism is a very serious matter, and ignorance of this is not an excuse. If you submit work, claiming it to be your own, and it is not original work of your own this is cheating. This can result in academic penalties both in relation to your assignment, but also on your permanent university record.If you quote content from another place, use a reference. That is perfectly acceptable. However, if you don’t use a reference you could lose marks. If the work is actually that of another student, then a plagiarism case may be filed against you with the possible penalties mentioned above.More information can be found here (pages 7-10 have examples of how to cite correctly): http://www.utas.edu.au/__data/assets/pdf_file/0010/285049/student_guide_to _academic_integrity.pdfOr in a helpful poster located on the notice board in many of the computer labs.If you have any questions about this matter please don’t hesitate to ask me, or indeed another staff member.Submission The assignment is due on Thursday the 13th of September (Week 8) at 3 pm. It will be submitted via the MyLo unit website for this unit as well as the peer assessment tool linked from MyLo. The submission is to be a Word document or PDF. Do NOT zip or compress the submission, just submit the file.You are not required to include an electronic cover sheet as submitting to MyLo will be a form of accepting the Universities policies around plagiarism and your way of claiming that this is entirely your own work.
Get It Done! Today
Every Assignment. Every Solution. Instantly.
Deadline Ahead? Grab Your Sample Now.