IT-478 Network Security

User Generated

ZBBQ_Du

Programming

seu saudi electronic university

Description

Unformatted Attachment Preview

College of Computing and Informatics Project/Case Study Deadline: 23/04/2025 @ 23:59 [Total Mark is 14] Student Details: CRN: Name: Name: Name: ID: ID: ID: Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format. • It is your responsibility to check and make sure that you have uploaded both the correct files. • Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation). • Email submission will not be accepted. • You are advised to make your work clear and well-presented. This includes filling your information on the cover page. • You must use this template, failing which will result in zero mark. • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question. • Late submission will result in ZERO mark. • The work should be your own, copying from students or other resources will result in ZERO mark. • Use Times New Roman font for all your answers. Restricted - ‫مقيد‬ Answer Pg. 01 Learning Outcome(s): Explain the concepts of cryptography, encryption, hash functions, message authentication, digital signatures and Network Security. Description and Instructions • This project is a research group activity. Each group has up to 3 students. • Each group should choose a topic from the provided list of topics. • Students must use reputable sources and at least 2 scientific papers in their research. • There is a presentation in the last week before the final exam. • Total Marks = 14 The deliverables of the project should include a report with the following sections: o Abstract: summary of chosen problem. (2 Marks) o Introduction: a brief introduction about the chosen topic. These should be demonstrated using text and diagrams. (2 Marks) Recognize network security issues, including threat, countermeasures, malicious software and intruders. o Background: a brief of the chosen topic (provide any terms or theories the reader should know about). (2 Marks) o Discussion: discuss the chosen topic thoroughly. (3 Marks) o Conclusion: summarize the findings of the discussion. (2 Marks) o References: The citation should follow the APA style. (1 Marks) o Your paper must be 4-6 pages, including references. Presentation: o Presentation: short presentation regarding the project (2 marks) Topics: 1- Importance of Transport level security protocols and its applications. 2- Cybersecurity Risks in IoT Devices and Their Countermeasures 3- Ransomware Attacks Case Studies and Mitigation Techniques 4- DNS Security Attacks and Protection Mechanisms Restricted - ‫مقيد‬ Answer Pg. 02 5- Analysis of various protocols used for E-mail security. 6- Assessment of different techniques used for Wireless network security. 7- Threats and Security Measures in 5G Networks 8- Secure Cloud Storage Encryption and Data Integrity Methods 9- Wireless Intrusion Detection Systems Techniques and Effectiveness 10- Deep Packet Inspection Benefits and Privacy Concerns Restricted - ‫مقيد‬
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Outline
I.

Abstract:


II.

Introduction:


III.

a brief introduction about the chosen topic.

Background:


IV.

summary of chosen problem. (2 Marks)

a brief of the chosen topic

Discussion:


discuss the chosen topic thoroughly. (3 Marks)

V.

Conclusion:

VI.

References:


IMPORTANCE OF TRANSPORT
LEVEL SECURITY PROTOCOLS
AND THEIR APPLICATION
By
Student Name

Introduction
• TLS is a protocol securing data at the

transport layer.
• Fun Fact: "Over 90% of web traffic

uses HTTPS with TLS in 2025“
• Objective: "Explore why TLS matters

and where it’s used“.

Why TLS Matters?
• "Key Goals: Confidentiality, Integrity,

Availability (CIA Triad)"
• "Protects against:"
• Eavesdropping (snooping)
• Tampering (modification)
• Impersonation (masquerading)

How TLS works
• Encryption:
• AES for data protection

• RSA for secure key exchange

• Handshake:

Negotiates secure connection
• Verifies identity with certificates


• TLS 1.3: Faster, stronger security

Applications
• HTTPS: Secure web browsing (e.g.,

online banking)
• Email: Encrypted SMTP/IMAP (e.g.,

private messages)
• IoT: Protects smart devices (e.g.,

thermostats)
• Example: "TLS secures your bank login"

TLS Challenges
• Misconfiguration: Old versions (e.g.,

TLS 1.0) are risky IoT
• Overhead: Too heavy for some devices
• Quantum Threat: Future-proofing

needed

Conclusion
• TLS: Essential for secure digital life
• Future: Stronger, smarter protocols

ahead.


1

Importance Of Transport-Level Security Protocols and Its Applications

Student Name
University Affiliation
Course
Professor
Date

2
Abstract
Because of its increased importance, Internet-based communication growth requires
strong security measures to protect travelling data. TLS protocols work at the transport layer of
the OSI model to secure communication through diverse applications and provide reliable
protection. This document investigates how Transport Layer Security (TLS) maintains data
security through confidentiality protection and ensures integrity and availability to resist threats
that target data surveillance and modification attempts and deny service actions. This document
investigates three primary applications where TLS operates, which include HTTPS secure
browsing, email transfer, and data exchanges between IoT devices. Current scientific research
investigates how TLS has developed while assessing its network security performance,
configuration issues, and new digital threats. The findings affir...

Similar Content

Related Tags