Write My Paper Button

WhatsApp Widget

Cyber Algorithms That Changed the Future | My Assignment Tutor

1 | P a g eCSE1ACF: Cyber Algorithms That Changed the FutureAssignment 2Design and Implementation of Cyber Algorithms1. Due DateEnd of Week 112. Marking30% of total score3. FormatThe total length of your report is 1000 words4. GoalTo demonstrate your knowledge of the following:• Express a set of ordered steps in a formal language.• Illustrate the use of algorithms in solving cybersecurity problems• Analyse the steps required to execute an algorithm correctly5. The AssignmentThe growth of digital channels working with the online sale and purchase ofconsumer goods has powered a quick expansion in trade for counterfeitproducts all over the globe. In contrast to other industries, it is significantlysimpler to counterfeit fashion items. Counterfeiters simply copy-pasted theappearance and fixed the brand’s name on it. Thus, fashion industry forgershave a long history.You lead a team of security experts responsible for designing and setting upthe security infrastructure of a large international fashion industry with offices inAustralia, Asia, Europe, and the USA. The company employs a total of 1500staff in 12 cities worldwide.The online business was designed and implemented by a 3rd party softwarecompany 15 years ago using Windows XP as the front-end with passwordaccess control. The server is running Windows Server 2012 located inMelbourne with a backup site in London.Recently, the organisation has received confidential information that“counterfeit” traders have placed orders within the organisation.2 | P a g eThe company wants your team to find out what has gone wrong with the onlineshopping system and identify any remedial actions that could be taken to stopfuture similar issues.Your team is required to perform the following: Identify any possible weaknesses in the existing operatingenvironment. Recommend any automated and manual measures to be establishedto detect, deter, and delete any possibility of “counterfeit” traders; Propose any new procedures and algorithms required to assure theauthenticity of traders and the trades. This may include mechanisms to:• Authenticate and authorise the traders when placing an order• Detect any counterfeit items going in and out of the organisation.6. Submission of your assignmentYour assignment should be submitted through the Latrobe University OnlineAssignment Submission facility.Your report should describe your understanding of the problem areas that thecompany is facing and provide evidence how your team have identified thefootprints left by the “counterfeit” traders.You may consider using one of the digital forensic investigation models(covered in week 2) to describe the possible types of attacks experienced bythe trading system and the impact to the system.You need to describe your suggested enhancements to the cybersecurityprocedures for the company and the required algorithms to be implemented indelivering the enhanced features in the system.You may also wish to discuss the use of biometric (e.g., face and fingerprint)authentication and authorisation mechanisms as well as the use of symmetricencryption or asymmetric encryption techniques, asymmetric key exchangetechnique and digital signatures; in protecting the privacy and integrity oftrading orders.You may also consider using error detection and correction techniques (e.g.hash function, Hamming Code, CRC, etc.) to ensure the trade orders areplaced and executed correctly.Furthermore, you may consider the use of automated neural networks andpattern recognition techniques to determine the existence of “counterfeit”fashion items and duplicate order in the receiving and dispatching of items ineach branch office.For each area of the recommended implementations, your team is required toexpress the proposed implementation with a set of ordered steps in a formallanguage (those you have learned in this subject), such as:• Lexical Analysis to analyse valid trade orders;• Metawords to describe the properties of a valid trade order;3 | P a g e• Pseudo Code or Turing Machine to explain the steps involved in theauthentication, authorisation, neural networks, and pattern recognitiontechniques in error detection.• Decision Tree, Cluster Analysis, and/or Neuro Network to implementautomated detection of “counterfeit” traders.You may also consider using diagrams (such as Flow Chart, NetworkDiagram, Process Flow Diagram, and/or other tools that you have learned inthis subject) to illustrate the algorithms that your team is going to implement.Formatting guide for your assignments1. Section NumberingThe assignment report needs numbered sections to make it easy for readersto locate the information they are interested in.Provide an abstract section which provides a concise and accurate summaryof the issue (max. 200 words).The first section to be numbered is the introduction (1). Sub-sections arelabelled 1.1, 1.2, 1.3 or 2.1, 2.2, 2.3 etc. If you need further subsections, youcan use three levels of heading e.g. 1.1.1, 1.1.2, 1.1.3 etc.2. Page numberingAll pages after the title page should be numbered Arabic numerals i.e., 1, 2, 3etc. Print your work on one side of the paper only.3. FontChoose a clear font (Arial, Times New Roman or Verdana). Apart fromheadings, all text should be font size 12. Use single line spacing.4. HeadingsYou may consider using automated heading styles in Microsoft Word.The “Styles” panel lists all possible levels of heading. It is handy to use theseautomatic styles if you use the automated table of contents feature inMicrosoft Word.5. IllustrationsFigures and tables should be used to illustrate concepts and summarise datato add clarity to your report.Figures and tables need to be numbered and labelled.6. Referencing4 | P a g eIf you include figures or tables that you did not create yourself, you need toprovide a reference.The Academic Referencing Tool (ART) provides detailed examples of the fourreferencing styles; AGLC3 (Law), APA 6, Footnoting and Harvard that havebeen endorsed for undergraduate students by La Trobe University. FollowHarvard referencing style. Please provide in-text citations.Visit http://www.lib.latrobe.edu.au/referencing-tool/ for more details.7. Academic IntegrityLatrobe University has a set of Academic Integrity Policies(http://www.latrobe.edu.au/students/admin/academic-integrity) which statesclearly that the following types of academic misconduct will not be tolerated:• Plagiarism: copying other people’s work without properacknowledgement;• Collusion: working together on an individual assessment task; and• Cheating: copying from other people’s work, unauthorised access toprohibited materials, or paying someone else to do the assignment.Latrobe University makes use of plagiarism software to detect anyinfringement. Any infringing student found will receive zero (0) mark for theassignment, and face the possibility of failing the whole subject, depending onthe level of seriousness of the infringement.8. Late SubmissionPenalties will be applied to late assignments (5% of the total assignment markwill be deducted per day and if late submission for more than three days musthave the lecturer’s permission.5 | P a g eRubric for marking CSE1ACF Group Assessment TwoStudent Name:_______________________ Student Number _______________________ CategoryCriteriaMaximum marksout of 100MarksscoredAbstractConcise and accurate summary of theissue (100 to 200 words)Marks/10Identification ofpossibleweaknesses1. Demonstrate knowledge of digitalforensic model (4)2. The background information i.e.specific situation of yourorganisation (4)3. Clearly identify the weakness andthe requirements for the specificsituations (6)4. Explanation of definition, terms andconditions of the possible attacksand the kinds of impacts to theorganisation and the end users (6)Marks/20Rational for thesuggestedchanges to theprocessesand/orinfrastructrure1. Well-articulated discussion withfacts and technical explanation forthe suggested process and/orinfrastructure changes (8)2. Points for connecting with thetheory of any specific algorithms tothe problems being solved (8)3. Points for the relevance of eachpoint to the topic (4)Marks/20Details of theimplementationof the processand/orinfrastructurechanges1. Proper illustration of formalalgorithmic methods (8)2. Process steps are clearlyarticulated with justification andtechnical explanation for thesuggested changes (4)3. Good use of diagrams in explainingthe implementation (4)4. Points for connecting with thetheory of cybersecurityinfrastructure for any specificalgorithms (4)Marks/20ConclusionConcise comment on the benefits andpriorities (100 to 200 words)Marks/10 6 | P a g e ReferencesList1. References list formatted correctly(2)2. References cited correctly (in thetext) (3)3. References cited are relevant tothe context (2)4. Show depth and breadth of reading(3)Marks/10OverallPresentation1. Presentation: Title has all detailsrequired (2)2. Organisation: Neat and tidy work incorrect logical order of allappropriate sections (3)3. Mechanics and Grammar:Proofread for typographical, wordlimit (1000 +- 10% words) and fonterror for referencing, line spacing(3)4. On time submission (2)Marks/10Comments

Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?