Assessment 1: Network Security Academic paper
CSI6116 Network Security
1 Assessment Details
|Unit Title||Network Security|
|Title||Network Security Academic Paper|
|Marks||This assessment contributes to 40% of the total marks of the unit.This assessment is marked out of 40.|
|Length||3,500 – 4,000 words|
|Learning objectives addressed in this assessment||· Execute effective research in the field of network security.|
|1. Abstract||Week 2: 7th August 2018 (not assessed, for approval)|
|2. First Draft||Week 6: 4thSeptember 2018 (not assessed, for feedback)|
|3. Final Submission||Week 12: 28th October 2018 (assessed)|
This is an individual assessment. Discussing among your fellow classmates, discussion forums, and in the classis encouraged, however, the work that you submit must be your own work.
You are required to write a research paper of publication quality in the broad theme ofOffensive and Defensive Artificial Intelligence (AI) for Network Security.
There are three milestones in this assessment as indicated in Section 1. Milestones 1 and 2 are there to help you keep on track and provide you with the opportunity to obtain further feedback from the lecturer. Milestone 3 marks the final submission deadline.
- Research the area for a suitable topic of interest in the context of Network Security. This is to help you focus and scope your research to a specific area for the paper. Draft an initial Abstract and submit to the lecturer before the deadline for Milestone 1. This will help you obtain feedback and direction on how to proceed.You will need approval before proceeding.
The abstract should be 250-500 words in length. Please note, this abstract is not the same as the one you will have in the final paper. This is more like an outline of what you propose to research for the paper.
|The abstract is a short document consisting of:· Title of the paper|
· No more than 300 words describing what you will cover in your paper.
Title: The forensic challenges of umapolophous encryption
Abstract: Today the biggest challenge that we face is the wide-spread use of umapolophousencryption in mobile devices. This has prompted several forensic challenges in the acquisition of evidence during crime investigations by law enforcement. There growing consensus in the forensic community is to force manufacturers of mobile devices to standardise the umapolophousProtocols A1.645 and publish as an open standard. This paper discusses challenges faced by law enforcement and potential solutions.
- Your paper should be of publication quality. The following are specific things you should be aware of:
- Broad coverage of the research topic.
- Use of authoritative sources for references, including: books, journals, conference proceedings, whitepapers (technology vendors), technical blogs and articles (reputed and established in the area of research). This also means the proper referencing.
- Flow of ideas and arguments.
- Use of tables and figures to present relevant information.
- Use of language (grammar, spelling, and punctuation).
- Consistent formatting. The following is a format you may use (scroll to bottom of the page and use the TEMPLATE provided):
- Your paper should cover the following areas:
- Background: The major concepts and related technologies in both Network Security and AI must be listed and described with some historical perspective of how/why they first came to be. Your reflection on how these concepts/technologies are related (if any) is desired. Do not address these as two separate things, i.e. Network Security and AI in combination defines the context of the paper.
- Offensive and/or Defensive AI:Make sure you define key concepts here, i.e. what do you consider as Offensive and/or Defensive AI in Network Security? Please note, you may address both, but you are only required to choose one of these.
- If you choose to discuss about Offensive AI, then provide countermeasures to defend the network from these.
- If you choose discuss Defensive AI, then provide the threats these techniques will defend the network against.
- The most recent developments (i.e. state-of-the-art) must be described. Any similarities, differences, advantages, and/or disadvantages must be contrasted.
- Critical analysis, i.e. in addition to restating what the literature has provided, your own thoughts and reflection on the issues based on fac0ts is encouraged.
- Current and future challenges: What challenges stakeholders face due to offensive/defensive AI presently and potentially in the future? What are the consequences due to these challenges for Network Security? Critical analysis and proposing potential solutions for these challenges is encouraged.
- Ethical issues:What are the ethical issues that arise due to the use of offensive/defensive AI in Network Security? Describe these with suitable examples of previous incidents or cases. Critical analysis of these issues is encouraged.
- Send your first draft as per Milestone 2 for feedback. This will not be assessed but strongly recommended. Feedback will be provided with 2 working days. Any major issues will be identified and broad comments will be provided on how to improve your paper. Do not request for any potential marks at this stage.
- Only submit in Word document format for feedback and final submission.
- Make sure you submit on time as per Milestone 3.
- Refer to the marking criteria in Section 4 to find out how you can meet the expected requirements of the assessment.
4 Marking Criteria
The following is the marking criteria used for this assessment. Any additional feedback will be provided in the space provided below.
|Success Criteria||Performance Indicators|
|Low Performance*||Meet Expectations||Meet Expectations +Exceptional||Marks obtained|
|Background||Related concepts have been mentioned |
|Related concepts have been described with historical perspective||Relationships between concepts have been reflected||? out of 5|
|(0 to 1)||(2 to 4)||(5)|| |
|Offensive and/or Defensive AI||Key concepts and most recent developments have been mentionedand some countermeasures/threats have been mentioned||Clear definitions provided and most recent developments and countermeasures/threats have been described and contrasted||Additionally, most recent developments and countermeasures/threats have been analysed critically||? out of 16|
|(0 to 6)||(8 to 14)||(15 to 16)|| |
|Current and future challenges||Current challenges have been mentioned||Current and future challenges have been described and consequences identified||Current and future challenges have been analysed critically and potential solutions proposed||? out of 8|
|(0 to 2)||(3 to 6)||(7 to 8)|| |
|Ethical issues||Ethical issues have been mentioned||Ethical issues have been described with related examples||Ethical issues have been analysed critically||? out of 6|
|(0 to 2)||(3 to 5)||(6)|| |
|Publication quality||Minimal attempt made and below expectations||Suitable for publication with major revisions||Suitable for publication withminimal revisions||? out of 5|
|(0 to 1)||(2 to 4)||(5)|| |
|? out of 40|
|Additional Feedback: |
* Please note that if you fail to meet the minimum performance for a given success criteria, you will be awarded a zero (0) under the “Low Performance” performance indicator.
5 Assessment Submission
Your assignment should be presented as an academic paper. You are required to submit this paper via Blackboard.
If any point is unclear send an e-mail, phone, or make an appointment well before the assignment is due. As professionals you are expected to balance work and other commitments to ensure timely completion of all tasks, your university course is no different. Students are reminded that work commitments are typically not sufficient grounds for extension of deadlines and that an extension is granted as an exception rather than a rule.
All sources of references must be cited (in text citation) and listed (end reference list). For details about referencing and the required format, please refer to the ECU Referencing Guide, which can be found from the following URL:
It is expected that you demonstrate a wide range of reading on your selected topics through the judicious use of references to construct and validate argument.
The University provides the EndNote bibliographic program free of charge to students to help them manage the complex task of referencing. Students are encouraged to use the software and it can be accessed from the following URL:
7 Academic Misconduct
Please ensure that you have read and understood the information on plagiarism provided on Blackboard. Also note that all assignments submitted are subjected to automated and manual plagiarism checks before marking of your assignment commences. Students who are found to have evidence of plagiarism, direct copying or collusion will be dealt with as per the University – Academic Misconduct Policy.