project100

ProjectDeadline: Tuesday 05/12/2023 @ 23:59
[Total Mark is 14]
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Templat
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces betw
words, hide characters, use different character sets, convert text into image or languages other than En
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the c
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwis
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Student Details:
CRN:
Name:
Name:
Name:
ID:
ID:
ID:
Description and Instructions
Pg. 01
Learning
Outcome(s):
Explain the
concepts of
cryptography,
encryption, hash
functions,
message
authentication,
digital signatures
and Network
Security.
Description and Instructions

This project is a research group activity. Each group has up to 3 students.

Each group should choose a topic from the provided list of topics.

Students must use reputable sources and at least 2 scientific papers in their
research.

There is a presentation in the last week before the final exam.

Total Marks = 14
The deliverables of the project should include a report with the following
sections:
o Abstract: summary of chosen problem. (2 Marks)
o Introduction: a brief introduction about the chosen topic. These should
be demonstrated using text and diagrams. (2 Marks)
Recognize
network security
issues, including
threat,
countermeasures,
malicious
software and
intruders.
o Background: a brief of the chosen topic (provide any terms or theories
the reader should know about). (2 Marks)
o Discussion: discuss the chosen topic thoroughly. (3 Marks)
o Conclusion: summarize the findings of the discussion. (2 Marks)
o References: The citation should follow the APA style. (1 Marks)
o Your paper must be 4-6 pages, including references.
Presentation:
o Presentation: short presentation regarding the project (2 marks)
Topics:
1- Comprehensive comparison between Symmetric Key cryptography
algorithms.
2- Comprehensive comparison between Public key Cryptography algorithms
1
Description and Instructions
Pg. 02
3- Techniques used for Key distribution using Symmetric Encryption and
Asymmetric Encryption.
4- Conduct a comparative survey on various security concerns and
countermeasures in Cloud computing models.
5- Analysis of various techniques used for Network access control.
6- Importance of Transport level security protocols and its applications.
7- Assessment of different techniques used for Wireless network security.
8- Importance of Network level security (IP security) protocols and its
applications.
9- Analysis of various protocols used for E-mail security.
10- Impacts of different types of Malwares and prevention techniques.
2
Answer
Pg. 01
Your Answer Here
1
Project/Case Study
Deadline: Day 5/12/2023 @ 23:59
[Total Mark is 14]
Student Details:
CRN:
Name:
Name:
Name:
ID:
ID:
ID:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment T
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g., misspell words, remove spac
words, hide characters, use different character sets, convert text into image or languages other t
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information o
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified o
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Project Instructions
Pg. 01
Project Instructions
Project Objective:
This activity is an opportunity for you to practice your knowledge and to develop skills
in cybersecurity and explore the security incident in depth, identify areas for
improvement, and learn from the experience to prevent future attacks.
Total Marks = 14
Project report
Presentation
11 marks
3 marks
• Group Size = 2-3 Members.
• One group member (group leader/coordinator) should submit all files: Project Report
and Presentation Slides on blackboard. Marks will be given based on your submission
and quality of the contents.
Project Report
• Each Report will be evaluated according to the marking criteria mentioned in each
question section.
Presentation
• Students (Group) need to present their project (either F2F or Virtual).
• The presentation schedule with date and allocated timing will be shared with the
students via Blackboard.
Project Scenario
Pg. 02
Project Scenario
Assume that you are given a task to build up a whole network for a bank in Saudi
Arabia. Describe how you are going to build the network, which would allow
every department to access the network. At the same time, you must enforce
security at many levels, such as writing and enforcing policies, using special
equipment, and using innovative technology for detection. The following
highlights the main objectives of this projects:

Understand and describe different network topologies and devices. Design a
network that meets specific requirements and communicates complex ideas
visually.

Understand and apply security frameworks. Develop and write clear and
concise security policies. Integrate security policies into the overall bank
security strategy.

Ability to identify and describe different types of security risks. Understanding
of the technical details of how security attacks work. Ability to explain how
hackers might exploit vulnerabilities in the bank’s systems.

Identify and assess the risks that a bank faces from security attacks and
disasters. Develop contingency plans to mitigate the impact of these risks.

Identify and discuss new technologies that have the potential to make a
significant impact on bank security.

Assess the team’s ability to communicate their project effectively and develop
their presentation skills.
Hence, review all the course’s PowerPoint files to do your project properly.
Question One
Pg. 03
Learning
Outcome(s):
CLO1
Describe main
principles of cyber
security.
Question One
2 Marks
In detail, describe and draw a conceptual figure(s) of the network and
devices you would adopt and use?
Question Two
Pg. 04
Learning
Outcome(s):
CLO1
Describe main
principles of cyber
security.
Question Two
2 Marks
In detail, develop and write the bank’s policies using a well-known
security framework (e.g., ISO).
Question Three
Pg. 05
Learning
Outcome(s)
CLO 2
Analyze security
threats,
vulnerabilities,
and risks.
Question Three
2 Marks
In detail, discuss different security risks that the bank might encounter
theoretically and technically. This would include discussing different
security attacks where hackers would use. You can think of your job here
as an ethical hacker.
Question Four
Pg. 06
Learning
Outcome(s):
CLO 2
Analyze security
threats,
vulnerabilities,
and risks.
Question Four
1.5 Marks
Next, you must develop a risk assessment and different plans (which you
have learned throughout this semester). The plans would allow the bank
to continue performing its daily operations even if it is under security
attacks and/or disasters events.
Question Five
Pg. 07
Learning
Outcome(s):
CLO 5
Examine the
implemented
security controls.
Question Five
2 Marks
Discuss the technological trends that you might adopt and use to
innovatively enhance the security of the bank?
Question Six
Pg. 08
Learning
Outcome(s):
CLO 3
Apply proper
security
countermeasures.
Question Six
1.5 Marks
Now, suppose a staff member in the bank opened an infected file
attached to an email. The file contains a “worm” that infected the staff
member’s PC and all the other PCs in the bank’s networks. In detail,
discuss the possible solutions that you would use to prevent this type of
security threat in the future?
Question Seven
Pg. 09
Learning
Outcome(s):
Question Seven
3 Marks
Last, you and your team members must present and demonstrate the
project at the end of the semester. You must prepare 10-15 PowerPoint
slides. The presentation instructions will be given to you in the upcoming
weeks.
This question must be delivered via PowerPoint as an oral presentation.
ENG 103
Assignment Project
Student Name:
Student ID:
CRN:
Module Title:
ENG103: Technical Writing
Mark:
Out of 10 points.
Feedback to Learner:
You are required to write a Technical Document.
• Step 1: Students should complete the Information Plan (3 points)
Assignment Questions:

Step 2: Students should write the Document Outlining (3 point)

Step 3: Students should Design the Technical Document (4 points)
Step 1: Completing the Information Plan
Name: _______________________
Student’s ID: _________________
Section #: ____________________
1. Technical document’s topic:
_____________________________________________________________________________
_____________________________________________________________________________
2. Introduction:
_____________________________________________________________________________
_____________________________________________________________________________
3. Part One: Analysis
1.1. Audience (primary and/or secondary):
_____________________________________________________________________________
1.2. Purpose (primary and/or secondary):
_____________________________________________________________________________
1.3. User tasks (tasks and subtasks):
_____________________________________________________________________________
Part Two: Design Plans (type/ format of the technical document)
_____________________________________________________________________________
_____________________________________________________________________________
References:
_____________________________________________________________________________
3
Step 2: Document Outlining
Chapter 6: pp. 86 + 87
Name: _______________________
Student’s ID: _________________
Section #: ____________________
I.
INTRODUCTION:
II.
BODY:
1. Headings
2. Headings and subheadings outlining:
• Alphanumeric Notation
• Decimal Notation
3.



Sequence:
Chronological Sequence
Problem-Solution Sequence
Cause and Effect Sequence or mix
III.
CONCLUSION:
• Solutions
• Suggestions
• Proposals
• Advice, etc.
3
Step 3: Designing the Technical Document
4
Name: _______________________
Student’s ID: _________________
Section #: ____________________
Suggestion Tools for Designing:
1. Canva (brochure):
https://www.canva.com/
2. Venngage (infographic):
https://venngage.com/
3. Word Doc

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed with your coursework?
Get quality coursework help from an expert!