Description
see
Project
Deadline: Wednesday 03/12/2025 @23:59
[Total Mark is 14]
Student Details:
CRN:
Name:
Name:
Name:
ID:
ID:
ID:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted – مقيد
Description and Instructions
Pg. 01
Learning
Outcome(s):
Explain the
concepts of
cryptography,
encryption, hash
functions,
message
authentication,
digital signatures
and Network
Security.
Description and Instructions
•
This project is a group research activity. Each group can have up to 3 students.
•
Each group should choose a topic from the provided list of topics.
•
Students must use reputable sources and must include at least 2 scientific research
papers in their work.
•
There is a presentation in the last week before the final exam.
•
Total Marks = 14
The deliverables should include the project report with the following sections:
•
Abstract: Summary of the chosen problem. (1 Mark)
•
Introduction: A brief introduction to the chosen topic. These should be
demonstrated using text and diagrams. (2 Marks)
•
Recognize
Background Work: A brief description of the chosen topic explaining any terms
or theories the readers should know about. (2 Marks)
network security
•
Discussion: Discuss the findings about the chosen topic thoroughly. (3 Marks)
issues, including
•
Conclusion: Summarize the findings of the discussion. (1 Mark)
threat,
•
References: The citation and references should follow the APA style. (1 Mark)
countermeasures,
malicious
software and
intruders.
❖ Your report must be of about 4-6 pages, including the references.
•
Presentation: A short presentation of about 7-8 slides on the topic. (4 Marks)
Topics:
•
Comprehensive comparison between symmetric key cryptography algorithms
and asymmetric key cryptography algorithms.
•
The importance of Transport Layer Security (TLS/SSL) protocols and their
applications.
•
Wireless network security: A comparative analysis of WEP, WPA, WPA2, and
WPA3.
1
Description and Instructions
Pg. 02
•
Network Access Control (NAC): Techniques, benefits, and challenges.
•
Impacts of different types of malwares and their effective prevention
techniques.
•
Web security, ethical hacking and penetration testing.
•
Secure Shell (SSH): Encrypting remote terminal sessions.
•
Port Security Tools: Monitoring and restricting access to sensitive ports.
•
IPsec (Internet Protocol Security): Encrypts and authenticates IP packets.
•
VPNs (Virtual Private Networks): Uses IPsec or SSL to create secure tunnels.
•
Firewalls: Filters traffic based on IP addresses and protocols.
•
Intrusion Detection/Prevention Systems (IDS/IPS): Monitors for malicious
activity.
2
Answer
Pg. 01
Project Report:
1
Purchase answer to see full
attachment