Assignment 2 Due: 3:00 pm Thursday the 1st of June Introduction This assignment is a major assignment in the area of network security. The goal is for each of you to focus on a particular part of network security to a greater depth than was examined in assignment one. Assignment Specification This assignment can be completed as an individual assignment, or in groups of 2. Whether you complete it in a group, or by yourself, is up to you. However, I suggest you decide whether you are doing it in a group as soon as possible, so that you can decide on your topic and get to work. Once you have selected a topic, it is time to get busy. This is a research assignment, and it is longer than the written reports we have already completed. As such you are expected to read more content than you did in these to be able to demonstrate your understanding of your topic at deep level. Academic sources are expected, most of which would be peer-reviewed articles that have been published in Journals or Conferences. This assignment is different to the written tasks in terms of how it is to be presented. This paper will be presented like a conference paper that is of a publication level in terms of its layout and style. To achieve this use the following template: http://www.ieee.org/conferences_events/conferences/publishing/templates.html This is a popular template used by many conferences held around the globe. You can give your paper a different title to the full question listed below. If you have any questions about how to match up with it, please contact me. However, it should be fairly self-explanatory. This assignment is to be 4000 words in length, plus or minus 10%, and not including the references or contents page. This assignment has both a physical and electronic submission. Topic List Choose one of the following: 1. Discuss the computation that enables biometrics to be used for evidence of identity in a digital world and discuss the vulnerabilities and threats that may impede the successful use of biometrics for this purpose. 2. What is PKI? Discuss the challenges and benefits which face a company for in-house PKI vs Commercial PKI. 3. Government and Law enforcement have a history of attempting to put encryption work arounds, and back doors, into consumer devices and security infrastructure. Discuss the successfulness and security ramifications on consumers of such policy. 4. Compare and contrast, in depth, the security requirements in control system networks (such as SCADA) to more typical general purpose networks. 5. IoT devices are increasingly common. Describe the security implications of the proliferation of such devices. Note on Plagiarism Plagiarism is a very serious matter, and ignorance of this is not an excuse. If you submit work, claiming it to be your own, and it is not original work of your own this is cheating. This can result in academic penalties both in relation to your assignment, but also on your permanent university record. If you quote content from another place, use a reference. That is perfectly acceptable. However, if you don’t use a reference you could lose marks. If the work is actually that of another student, then a plagiarism case may be filed against you with the possible penalties mentioned above. More information can be found here (pages 7-10 have examples of how to cite correctly): http://www.utas.edu.au/__data/assets/pdf_file/0009/917874/Student-Guideto- Academic-Integrity.pdf If you have any questions about this matter please don’t hesitate to ask me, or indeed another staff member. Submission The assignment is due on the 1st of June at 3:00 pm. It will be submitted via the MyLo unit website for this unit. There is a submission box to upload your Word document (or PDF) listed under the dropbox section of MyLo. There is also a paper submission box setup near the school office, on the hallway that leads to engineering. This submission is to include a printed copy of the assignment, and a signed assignment coversheet. You need to submit a paper version to have your assignment marked, as this is the copy the markers will use. UserName: _____________ Student ID: ____________ UserName: ____________ Student ID: ____________ Content Criteria NN-2 NN PP CR DN HD Accurate (40%) Contains inaccurate and contradictory information Contains significant inaccurate information Contains only few and minor inaccuracies and at least two peer reviewed sources Contains accurate information including at least four peer reviewed sources Contains accurate information including more than eight peer reviewed source Contains accurate information many well used appropriate peer reviewed sources Complete: is sufficient coverage of content to answer the question (30%) Scrappy, incomplete pieces of information Material does not contain important pieces of information The important areas of the topic are sufficiently explained but some minor areas may be missing Most areas of the topic are explained with some being clear and accessible All areas of the topic are explained with most being clear and accessible All areas of the topic are clearly and accessibly explained Presentation presented in the correct format. uses diagrams where needed (15%) Information not linked together to make subject understandable Unlinked text based presentation, with little evidence of design thought. Evidence of attention to presentation of materials, but not consistently applied Consistent attention to presentation of materials Good presentation and usage of diagrams where appropriate Outstanding presentation of document with usage of diagrams where appropriate Editing Spelling and grammar (10%) Grammatical and spelling errors in the material presented make it almost impossible to understand. Material presented has significant errors in: • Grammar • Spelling Material presented has some errors in grammar and spelling Material presented has some errors in grammar and spelling Material presented has a few errors in grammar and spelling Material presented is grammatically correct, contains no spelling errors Length Length appropriate (5%) Document was overly short or overly long (over 5000) Document not at right length Document no far from correct size Document was a good length, but needlessly wordy, and missed discussing other items at this expense Good length, but could have had a bit more work on its choice of content Very good length Overall: Comments