Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

IT-478: Network Security

Description

Description and Instructions

  • This project is a group research activity. Each group can have up to 3 students.
  • Each group should choose a topic from the provided list of topics.
  • Students must use reputable sources and must include at least 2 scientific research papers in their work.
  • There is a presentation in the last week before the final exam.
  • Total Marks = 14
  • Abstract: Summary of the chosen problem. (1 Mark)
  • Introduction: A brief introduction to the chosen topic. These should be demonstrated using text and diagrams. (2 Marks)
  • Background Work: A brief description of the chosen topic explaining any terms or theories the readers should know about. (2 Marks)
  • Discussion: Discuss the findings about the chosen topic thoroughly. (3 Marks)
  • Conclusion: Summarize the findings of the discussion. (1 Mark)
  • References: The citation and references should follow the APA style. (1 Mark)
  • Presentation: A short presentation of about 7-8 slides on the topic. (4 Marks)

The deliverables should include the project report with the following sections:

  • Your report must be of about 4-6 pages, including the references.


Topics:

  • Comprehensive comparison between symmetric key cryptography algorithms and asymmetric key cryptography algorithms.
  • The importance of Transport Layer Security (TLS/SSL) protocols and their applications.
  • Wireless network security: A comparative analysis of WEP, WPA, WPA2, and WPA3.
  • Network Access Control (NAC): Techniques, benefits, and challenges.
  • Impacts of different types of malwares and their effective prevention techniques.
  • Web security, ethical hacking and penetration testing.
  • Secure Shell (SSH): Encrypting remote terminal sessions.
  • Port Security Tools: Monitoring and restricting access to sensitive ports.
  • IPsec (Internet Protocol Security): Encrypts and authenticates IP packets.
  • VPNs (Virtual Private Networks): Uses IPsec or SSL to create secure tunnels.
  • Firewalls: Filters traffic based on IP addresses and protocols.
  • Intrusion Detection/Prevention Systems (IDS/IPS): Monitors for malicious activity.

Project Report:

College of Computing and Informatics

Project
Deadline: Wednesday 03/12/2025 @23:59
[Total Mark is 14]
Student Details:

CRN:

Name:
Name:
Name:

ID:
ID:
ID:

Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Description and Instructions

Pg. 01
Learning
Outcome(s):
Explain the
concepts of
cryptography,
encryption, hash
functions,
message
authentication,
digital signatures
and Network
Security.

Description and Instructions

This project is a group research activity. Each group can have up to 3 students.

Each group should choose a topic from the provided list of topics.

Students must use reputable sources and must include at least 2 scientific research
papers in their work.

There is a presentation in the last week before the final exam.

Total Marks = 14

The deliverables should include the project report with the following sections:

Abstract: Summary of the chosen problem. (1 Mark)

Introduction: A brief introduction to the chosen topic. These should be
demonstrated using text and diagrams. (2 Marks)


Recognize

Background Work: A brief description of the chosen topic explaining any terms
or theories the readers should know about. (2 Marks)

network security

Discussion: Discuss the findings about the chosen topic thoroughly. (3 Marks)

issues, including

Conclusion: Summarize the findings of the discussion. (1 Mark)

threat,

References: The citation and references should follow the APA style. (1 Mark)

countermeasures,
malicious
software and
intruders.

❖ Your report must be of about 4-6 pages, including the references.

Presentation: A short presentation of about 7-8 slides on the topic. (4 Marks)

Topics:

Comprehensive comparison between symmetric key cryptography algorithms
and asymmetric key cryptography algorithms.

The importance of Transport Layer Security (TLS/SSL) protocols and their
applications.

Wireless network security: A comparative analysis of WEP, WPA, WPA2, and
WPA3.

1

Description and Instructions

Pg. 02

Network Access Control (NAC): Techniques, benefits, and challenges.

Impacts of different types of malwares and their effective prevention
techniques.

Web security, ethical hacking and penetration testing.

Secure Shell (SSH): Encrypting remote terminal sessions.

Port Security Tools: Monitoring and restricting access to sensitive ports.

IPsec (Internet Protocol Security): Encrypts and authenticates IP packets.

VPNs (Virtual Private Networks): Uses IPsec or SSL to create secure tunnels.

Firewalls: Filters traffic based on IP addresses and protocols.

Intrusion Detection/Prevention Systems (IDS/IPS): Monitors for malicious
activity.

2

Answer

Pg. 01
Project Report:

1

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Research & Summaries Question

Description (( PLEASE USE YOUR OWN WORDS AND WRITE THE REFERENCE)) (( PLEASE CHECK THE ATTACHED FILE AND FOLLOW THE INSTRUCTIONS CAREFULLY )) (( PLEASE NO PLAGIARISM )) (( Please use APA 7th edition )) ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education

Research & Summaries Question

Description (( PLEASE USE YOUR OWN WORDS AND WRITE THE REFERENCE)) (( PLEASE CHECK THE ATTACHED FILE AND FOLLOW THE INSTRUCTIONS CAREFULLY )) (( PLEASE NO PLAGIARISM )) (( Please use APA 7th edition )) ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Public Management (MGT 324) Due Date: 4th October 2025 @ 23:59 Course Name:

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Public Management (MGT 324) Due Date: 4th October 2025 @ 23:59 Course Name:

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Public Management (MGT324) Due Date: 01/11/2025 @ 23:59 Course Name: Public Management Course

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Public Management (MGT324) Due Date: 01/11/2025 @ 23:59 Course Name: Public Management Course

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment-3 MGT324-Public Management Due Date: End of week 13, 6th of December@, 23:59) Course Name:

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment-3 MGT324-Public Management Due Date: End of week 13, 6th of December@, 23:59) Course Name:

9 SOLVE new

Description Students’ assignmentWrite a review on one of the following Saudi Public Health policies including analysis of the policy, challenges and achievementsFormat:– word file named by student’s name8-12 pages including cover page (with title and name of student)Font size: 12 Times New Roman– 1.5-line spaceNormal margins– Similarity index: total :

Writing Question

Description The assignment example is attached, so please read it carefully, if you can’t help me in this assignment research in this different course, it’s ok. but the most important point is that you can deliver it on time and understand it very well to give me perfect answer as

Electrical Engineering Question

Description I have two files containing course syllabi, and I want you to match the courses that are equivalent to courses in the other file because I want to transfer (equate) the courses at the university.Since I studied Biomedical Engineering and would like to transfer to the Electrical Engineering department,

King Faisal 3

Description See Innovative Nursing Care Delivery Model Paper For this assignment, you must look up INNOVATIVE (new or recent) nursing care delivery models and use them as a guide to answer the following questions, each question serving as a subtitle: 1. Identify innovative care delivery models 2. Enumerate on the

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

MGT430 – FINAL REPORT AND PRESENTATION

Description I HAVE FINAL REPORT AND PRESENTAION TO BE SUBMIT IT. I WILL UPLOAD FIRST, SECOND AND THIRD REPORT I HAVE BEEN DONE. FROM THOSE REPORT DO THE FINAL REPORT ”WORD” AND PRESENTATION ”POWERPOINT” AS INSTURCTED. PLEASE FOLLOW THE INSTRUCTION. IF YOU NEED ANY QUESTION ABOUT THE FACILTY OR MY

Decision Making and Problem Solving (MGT 312)

Description I want the answer for Q 1 and 8 For Q1 the answer from EBSCO file 100 word for Q 8 the answer you can take the idea from the file i sent and write less than 100 word please use simple words HBR’s fictionalized case studies present problems