Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

WRITING A LITERATURE REVIEW Introduction: In recent decades, the development of Internet and communications technologies has introduced a virtual world to everyone’s daily life. In this virtual wo

WRITING A LITERATURE REVIEW

Introduction:

In recent decades, the development of Internet and communications technologies has introduced a virtual world to everyone’s daily life. In this virtual world, people are able to do a large number of activities similar in the real world. Especially with the growth of Internet of Things (IoT) and 5G, the field of IT security is becoming more important. To help you better understand the field, you are required to write a literature review on any one of the following related IT security topics, either from the attack or defence view. The literature review should consist of 2500-4000 words (at least 6 pages, single spaced, 12pt fonts, on a normal A4 paper).

Topics:

Choose One only:

Attacks:

o   Advanced persistent threat

o   Insider threat

o   Emerging Attacks on Blockchain or the defences

o   Emerging Attacks on IoTs or the defences

o   Emerging Attacks on AI or the defences

o   Backdoor attacks or the defences

o   Denial of service or Distributed Denial of service

o   Eavesdropping

o   Exploits

o   Malware

o   Spam

o   Phishing

o   Ransomware

o   Vulnerabilities

Defences:

o   Access control

o   Application security

o   Secure coding

o   Authentication

o   Multi-factor authentication

o   Authorization

o   Data-centric security

o   Encryption

o   Intrusion detection/prevention system

o   Mobile security

o   Cloud security

References

All externally sourced information (i.e. not common knowledge or course material) must be cited. Referencing conventions required for this unit are: Vancouver (as used by IEEE).

Show more
Files: Exercise.docx
  • @
  • 1943 orders completed
ANSWER

Tutor has posted answer for $80.00. See answer's preview

$80.00

********

Click here to download attached files: Cloud Security.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question