Assignment 2
Due: 3:00 pm Thursday the 1st of June
Introduction
This assignment is a major assignment in the area of network security. The goal
is for each of you to focus on a particular part of network security to a greater
depth than was examined in assignment one.
Assignment Specification
This assignment can be completed as an individual assignment, or in groups of 2.
Whether you complete it in a group, or by yourself, is up to you. However, I
suggest you decide whether you are doing it in a group as soon as possible, so
that you can decide on your topic and get to work.
Once you have selected a topic, it is time to get busy. This is a research
assignment, and it is longer than the written reports we have already completed.
As such you are expected to read more content than you did in these to be able to
demonstrate your understanding of your topic at deep level. Academic sources
are expected, most of which would be peer-reviewed articles that have been
published in Journals or Conferences.
This assignment is different to the written tasks in terms of how it is to be
presented. This paper will be presented like a conference paper that is of a
publication level in terms of its layout and style. To achieve this use the following
template:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
This is a popular template used by many conferences held around the globe. You
can give your paper a different title to the full question listed below. If you have
any questions about how to match up with it, please contact me. However, it
should be fairly self-explanatory.
This assignment is to be 4000 words in length, plus or minus 10%, and not
including the references or contents page.
This assignment has both a physical and electronic submission.
Topic List
Choose one of the following:
1. Discuss the computation that enables biometrics to be used for evidence of
identity in a digital world and discuss the vulnerabilities and threats that
may impede the successful use of biometrics for this purpose.
2. What is PKI? Discuss the challenges and benefits which face a company for
in-house PKI vs Commercial PKI.
3. Government and Law enforcement have a history of attempting to put
encryption work arounds, and back doors, into consumer devices and
security infrastructure. Discuss the successfulness and security ramifications
on consumers of such policy.
4. Compare and contrast, in depth, the security requirements in control system
networks (such as SCADA) to more typical general purpose networks.
5. IoT devices are increasingly common. Describe the security implications of
the proliferation of such devices.
Note on Plagiarism
Plagiarism is a very serious matter, and ignorance of this is not an excuse. If you
submit work, claiming it to be your own, and it is not original work of your own
this is cheating. This can result in academic penalties both in relation to your
assignment, but also on your permanent university record.
If you quote content from another place, use a reference. That is perfectly
acceptable. However, if you don’t use a reference you could lose marks. If the
work is actually that of another student, then a plagiarism case may be filed
against you with the possible penalties mentioned above.
More information can be found here (pages 7-10 have examples of how to cite
correctly):
http://www.utas.edu.au/__data/assets/pdf_file/0009/917874/Student-Guideto-
Academic-Integrity.pdf
If you have any questions about this matter please don’t hesitate to ask me, or
indeed another staff member.
Submission
The assignment is due on the 1st of June at 3:00 pm. It will be submitted via the
MyLo unit website for this unit. There is a submission box to upload your Word
document (or PDF) listed under the dropbox section of MyLo.
There is also a paper submission box setup near the school office, on the hallway
that leads to engineering. This submission is to include a printed copy of the
assignment, and a signed assignment coversheet. You need to submit a paper
version to have your assignment marked, as this is the copy the markers will use.
UserName: _____________ Student ID: ____________ UserName: ____________ Student ID: ____________
Content Criteria NN-2 NN PP CR DN HD
Accurate
(40%)
Contains
inaccurate and
contradictory
information
Contains significant
inaccurate
information
Contains only few
and minor
inaccuracies and at
least two peer
reviewed sources
Contains accurate
information
including at least
four peer
reviewed sources
Contains
accurate
information
including more
than eight peer
reviewed source
Contains
accurate
information
many well used
appropriate peer
reviewed sources
Complete:
is sufficient
coverage of
content to
answer the
question
(30%)
Scrappy,
incomplete pieces
of information
Material does not
contain important
pieces of
information
The important
areas of the topic
are sufficiently
explained but some
minor areas may
be missing
Most areas of the
topic are
explained with
some being clear
and accessible
All areas of the
topic are
explained with
most being clear
and accessible
All areas of the
topic are clearly
and accessibly
explained
Presentation
presented in the
correct format.
uses diagrams
where needed
(15%)
Information not
linked together to
make subject
understandable
Unlinked text based
presentation, with
little evidence of
design thought.
Evidence of
attention to
presentation of
materials, but not
consistently
applied
Consistent
attention to
presentation of
materials
Good
presentation
and usage of
diagrams where
appropriate
Outstanding
presentation of
document with
usage of
diagrams where
appropriate
Editing
Spelling and
grammar
(10%)
Grammatical and
spelling errors in
the material
presented make it
almost impossible
to understand.
Material presented
has significant
errors in:
• Grammar
• Spelling
Material presented
has some errors in
grammar and
spelling
Material
presented has
some errors in
grammar and
spelling
Material
presented has a
few errors in
grammar and
spelling
Material
presented is
grammatically
correct, contains
no spelling errors
Length
Length
appropriate
(5%)
Document was
overly short or
overly long (over
5000)
Document not at
right length
Document no far
from correct size
Document was a
good length, but
needlessly wordy,
and missed
discussing other
items at this
expense
Good length, but
could have had
a bit more work
on its choice of
content
Very good length
Overall:
Comments