Task Write around 600 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty guidelines. Topic 1- Introduction to Information Security Question 1 Research the issue of social engineering in the context of cyber security and report your findings, including what the problem is, types of social engineering techniques, existing and potential protection mechanism and future trends. Topic 2 - Cryptography Question 2 Research the two generalized cryptographic schemes: symmetric and asymmetric encryption. Write a report comparing the two schemes. Your research should include the latest developments in this field along with classical concepts. Topic 3, 4 & 5 - Network Security fundamentals and Firewalls Question 3 Intrusion detection systems (IDS) are used to monitor a network or systems for malicious activity or policy violations. Research the issue of current trends in Network Intrusion Detection Systems and report your findings. Referencing All sources of information must be appropriately referenced using the APA style ( http://student.csu.edu.au/library/integrity/referencing-at-csu ) Rationale This assessment aims at partially achieving the following subject objectives: - be able to explain basic information security concepts; - be able to discuss and debate some of the security implications of computer networks; - be able to compare and contrast firewall technologies. Marking criteria Criteria HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 Able to apply theories and concepts to analyse IT security implications Demonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through indepth discussion, providing highly relevant real world examples. Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis with suitable examples. Correct application of the IT Security perspective and mostly comprehensive analysis with suitable examples. Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission. Major omissions in the application of the IT security concepts and the analysis. Demonstrates application of research skills Literature and sources presented is evidence of high level application of Clear evidence of research relevant to the subject; able to Clear evidence of research relevant to the subject; uses Some evidence of research. Some Either no evidence of literature Criteria HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 through the critical analysis and evaluation of relevant literature research skills; with comprehensive and critical appraisal of the literature and discussion of theory supported by sources in addition to those recommended in the course content. Referencing style has no mistakes. critically appraise the literature and theory gained from a variety of sources. Referencing style correctly used. indicative texts identified. Referencing style correctly used. Minor omissions only.