The assignment consists of a report of 2000 words on a topic related to systems and network security in new computing areas. the report should have a one-page cover, showing the title of the report, the author (and the authors affiliation), and the year (and month) the report is written. Following the front page of the report should be the table of contents. A report should be properly sectioned and sub-sectioned, with each section or sub-section preferably numbered. Although double-column is widely used in articles published in technical magazines, for this assignment, it is not necessary to use double-column and single-column must be used. References used in the report should be listed in References. Any reference style specified in http://library.uws.edu.au/citing.php may be used or students may use the reference style used in IEEE publications. References should be quoted in the main body of the report. Tables and diagrams need to be used in a report. They should be suitably captioned and described in the main body of the report.
Length: 2000 words
Curriculum Mode: Essay
Write a report of 2000 words on one and only one of the following assignment topics related to security in new computing areas:
A student must choose one of the above topics for the report. The written contents of the report can be divided into Introduction, Main Report Body and Conclusion. Refer to the followings with regards to scopes and contents which should be included in the Main Report Body.
The Main Report Body should consist of three parts:
The report should consist of as much new materials as possible, in a sense that, materials which are covered in lectures of this unit should be treated as assumed knowledge and do not need to be described or explained in details in the report. For example in Cloud Computing Security, students must avoid covering security problems and solutions related to virtual machines, which are covered in one of the lecture topics.
Refer to the assignment specifications to be posted on vUWS for this unit for more details.
Resources: In general, as far as the contents of the report are concerned, examples of technical reports in systems and network security can be obtained from various technical magazines, transactions, and journals. These materials are widely available from the library especially via online access, for example, the IEEE Xplore Digital Library: http://ieeexplore.ieee.org/Xplore/guesthome.jsp?reload=true. Technical articles in the IEEE Communications Magazine are examples of technical reports in the postgraduate and professional levels in the areas of communications: http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=35.Order Now