[Solved] KIT711 – Written Reports

Due: Weeks 4, 7 and 10

Introduction
This assessment is a series of introductory assignments into network security. The goal is for each of you to examine problems in systems and networks from a security perspective. Not only will you research a problem, but you will also learn from other students.
Assignment Specification
This assessment is a series of three individual assignments on a range of topics that will then be peer assessed by other students using a peer review system that many of you may have used previously in KIT707 and KIT708. This peer assessment itself will then be subject to assessment by the original submitter. This system is accessible here
http://iweb.cis.utas.edu.au/peerassess/index.php
The three assignments will be due at 3pm on the Tuesday of week 4, and Monday of weeks 7 and 10. They will be worth a total of 20% of the final mark in the unit. Each assignment should be between 500 and 700 words in length, not including references and you will lose marks if the length is not within this range.
The written portion of the first topic will be worth 6%, with the written portion for the second and third topics being worth 7% each.
Week 4 – Due Tuesday 3pm on the 17th of March
This topic is to be based around a news event that is relevant to network security that has occurred in the last two years. There is a very wide range of topics that could be chosen, however, if you have any problems or questions, please contact your unit coordinator and ask.
The assignment must not be a simple narrative of events, but a discussion of the events that took place, and an examination of the security that may have been breached, or the implications of the event. You should be able to relate it back to the academic literature to give the event broader context.
Week 7 – Due Monday 3pm on the 13th of April
Authentication is a vital step in ensuring the security of devices and networks. This topic involves you learning about a common authentication device and considering the particular
technique’s strengths and weaknesses. You must choose one the following authentication methods:
 Fingerprint scanner
 Facial pattern recognition devices
 Voice biometric devices
 Retinal scan identification devices
Week 10 – Due Monday 3pm on the 4th of May
Choose one of the following cryptographic protocols and explore the security goals (considering CIA&A) that it is attempting to achieve.
 Zero-Knowledge Proofs
 Threshold Cryptography
 Secure Multiparty computation
 Blind Signatures
Peer Assessment
This assignment requires each student peer reviewing three other student’s submissions. This involves marking their submission against the CRA marking rubric (which is included as part of this specification) and providing quality feedback. After this has been completed, each student will then grade this assessment based on the quality of the feedback and how fair they think the mark was. How this assessment is to occur will be discussed in lectures.

Submission
The submission for all reports is to be in PDF format, and you must submit to two different locations:
1. The first submission location is the peer review system which will allow you to have your assignment viewed and assessed by other students, and for you to also view the assignments you are allocated to mark.
2. The second submission

 

Solution

Week 4 Discussion

The article by Marks (2020) talks about how some election systems are rigged to show a specific candidate as the winning candidate regardless of the number of votes cast. During elections, the election officials fear that hackers will interfere with the voting process. There is also a likelihood of technical failures that may derail the entire voting process. The voting machines experienced technical failure in Los Angeles because of Network and technical problems. As such,……………….

Week 7 Discussion

Authentication is a critical step in facilitating the security of both devices and networks. Some authentication methods include the fingerprint scanner, facial pattern recognition devices, biometric voice devices, and retinal scan identification devices. Voice biometric devices work by creating a digital profile of an individual’s speech to create a stored model voice template. This technology reduces every word spoken into segments made up of various dominant frequencies, commonly known as formants. Each formant has several tones captured digitally (Singh et al., 2018)…………..

Week 10 Discussion

Zero-knowledge proofs refer to methods through which one party, commonly known as a prover proves to another party known as a verifier that they know a particular value. Provision of this proof takes place without conveying any other thing apart from their knowledge of that specific value. Zero-knowledge proofs are essential because they show that one does not necessarily have to reveal the information they have just to prove that they have it (Broadbent et al., 2016)……………………..To access the rest of the solution for $10, please click on the purchase button.