Computer Security - Transtutors


23 févr. 2014 (il y a 3 années et 1 mois)

144 vue(s)

Computer Security

• Evaluate approaches to the management of IT Security

• Apply ideas from research and current practices to address problems of IT system

Assignment Description

You have to


a resea
rch paper with a total size of 6


The research paper should contain at least the following sections. Note that you may
add sections and subsections to improve the paper and its structure; for example, you
may want to

the literature review in sub
sections, and/or you may wan
t to
include a Background section after the Introduction.

1. An abstract where you state what you have done, what is the contribution of the
paper to the literature and what is the significance of that contribution (200
300 words).

2. An introduction whe
re you state the research context/background, your research
question, the practical relevance of this question, how you will answer this question,
and how the paper is structured.

3. A critical analysis of existing literature addressing your research ques
tion. For relevant
articles analyzed, provide a summary, discuss any interesting results, insights, or
contributions, and also discuss limitations,

omissions, or technical flaws you have
identified that are important regarding your research question. Addit
ionally, you can
also review relevant practices from high quality sources, when applicable.

4. A discussion of mitigation/countermea
sures from research and/or cur
rent practices
that minimize or avoid issues identified by the literature review in respect t
o the
research question.

5. A conclusion where you draw conclusions about the research you carried out to
answer the research question. Elaborate on possibilities for future research; imagine
you have the opportunity to carry on researching the topic base
d on the knowledge you
gained and the ideas you mentioned in the discussion.

The topic and research question that will drive your research can be selected from the
list contained in the next section.

Selection of Topics and of Research Questions

following topics and research questions are all related to different aspects of IT
security management. Each research question refers to one paper as a starting point for
your research.

Enforced Security Controls/Measures

What methods and techniques can
be used to evaluate the effectiveness of different
types of security controls/measures/mechanisms enforced in organizations? (e.g., social
engineering penetration test )

Authentication Methods

What are the types of attack that challenge
response authentic
ation is subject to, and
how they can be mitigated? (E.g., CAPTCHA)

What are the issues with biometric authentication, which reduce its security
effectiveness, and how they can be addressed? (E.g. typing biometric)

Cloud Computing

What methods and techniq
ues can be used by Cloud customers to control the security
of their own data in the Cloud? (E.g., Support Vector Machine technique [3])

Mobile Clouds

What are the security and privacy challenges faced by Mobile Cloud providers [2], and
how they could be m

Forensics in Security Incident Response

What are the issues in the use of Digital Forensics to incident response in organizations
[1], and how they could be addressed?


No Plagiarism and include at least 12 quality references.