Trimester T3 2018
Unit Code MN502
Unit Title Overview of Community Safety
Assessment Sort Particular person Assessment
Assessment Title Light-weight cryptography (Project one)
Objective of the
Assessment (with
ULO Mapping)
College students ought to have the ability to reveal their achievements within the following
unit studying final result:
b. Analyse and talk about frequent rising threats, assaults, mitigation
and countermeasures in networked data methods
Weight 15%
Complete Marks 80
Phrase restrict 1500 – 2000
Due Date Wednesday 02/01/2019, 11:55 PM
Submission
Pointers
All work should be submitted on Moodle by the due date together with a
accomplished Project Cowl Web page.
The task should be in MS Phrase format, 1.5 spacing, 11-pt Calibri
(Physique) font and a pair of.54 cm margins on all 4 sides of your web page with
applicable part headings.
Reference sources should be cited within the textual content of the report, and listed
appropriately on the finish in a reference checklist utilizing IEEE referencing model.
Extension If an extension of time to submit work is required, a Particular Consideration
Software should be submitted immediately on AMS. You could submit this
software three working days previous to the due date of the task.
Additional data is out there at:
http://www.mit.edu.au/about-mit/institute-publications/insurance policies procedures-and-guidelines/specialconsiderationdeferment
Tutorial
Misconduct
Tutorial Misconduct is a critical offence. Relying on the seriousness of
the case, penalties can range from a written warning or zero marks to
exclusion from the course or rescinding the diploma. College students ought to make
themselves accustomed to the total coverage and process out there at:
http://www.mit.edu.au/about-mit/institute-publications/insurance policies procedures-and-guidelines/Plagiarism-Tutorial-Misconduct-Coverage Process. For additional data, please discuss with the Tutorial Integrity
Part in your Unit Description.
MN502 Overview of Community Safety Web page 2 of four
Ready by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018
Project Description
The vast majority of trendy cryptographic algorithms had been designed for desktop/server
environments, many of those algorithms couldn’t be applied within the low-power gadgets
utilized in functions equivalent to automotive methods, sensor networks, healthcare, distributed
management methods, the Web of Issues (IoT), cyber-physical methods, and the good grid.
Safety and privateness is essential in all of those areas. The light-weight cryptography has the
objective of offering cryptographic options that want to keep up the useful resource vs safety
constraint.
On this context write a report together with the next sections:
A. Introduction in regards to the light-weight cryptography and its objectives
B. The potential safety threats in methods utilizing low-power gadgets
C. The working mechanism of light-weight cryptography
D. Efficiency metrics (-specific metrics and Software program-specific metrics)
E. Light-weight cryptographic algorithms
F. Present and Future challenges in light-weight cryptography
G. Conclusion
H. References
The Viva voce of the task will happen throughout Laboratory session in Week 7. The
scholar has to reply the viva questions associated to the task.
Project Directions:
Don’t use Wikipedia as a supply or a reference
Should contemplate at the least 5 present references from journal/convention papers and
books. Should observe IEEE referencing model.
Ensure you correctly reference any diagrams/ graphics used within the task.
MN502 Overview of Community Safety Web page three of four
Ready by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018
Marking Standards for the Project 1:
Marks are allotted as described within the following desk.
Sections No. Description of the part Marks
Introduction Introduction in regards to the light-weight cryptography and its objectives.
This part also needs to describe the report define.
10
Safety
Threats
Talk about three potential safety threats in methods utilizing low energy gadgets
12
Working
Mechanism
The working mechanism of light-weight cryptography 08
Efficiency
Metrics
Talk about intimately the efficiency metrics
-specific metrics
Software program-specific metrics
10
Algorithms Clarify any two light-weight cryptographic algorithms from
present literature
10
Challenges Present and Future challenges in light-weight cryptography 10
Conclusion This part concludes the general findings and contributions
of the report
05
References Should observe IEEE model 05
Viva voce Scholar should appropriately reply the viva questions associated
to the task.
10
Complete Marks 80
MN502 Overview of Community Safety Web page four of four
Ready by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018
Instance Marking Rubric for Project #: Complete Marks 80
Grade
Mark
HD
80% +
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
<50%
Glorious Very Good Good Passable Unsatisfactory
Introduction
/10
A really detailed
and really clear
dialogue
A properly written and
clear dialogue .
Typically good
dialogue .
Very transient
dialogue and
lacking report
define
Poor
Introduction with
irrelevant particulars
Potential
Safety
threats
/12
A really clear and
in-depth
dialogue about
three potential
threats
Very clear
dialogue about
three potential
threats
Typically good
dialogue about
three potential
threats
Transient dialogue
in regards to the potential
threats
Poor dialogue
about potential
threats with
irrelevant
data
Working
Mechanism
/08
A really detailed
and really clear
working
mechanism of
the light-weight
cryptography
Very clear working
mechanism of the
light-weight
cryptography
Typically good
dialogue about
working
mechanism of the
light-weight
cryptography
Transient dialogue
about working
mechanism of the
light-weight
cryptography
Poor dialogue
with irrelevant
data
Efficiency
Metrics
/10
An in-depth and
very clear
dialogue about
the
efficiency
metrics
Very clear
dialogue about
the efficiency
metrics
Typically good
dialogue about
the efficiency
metrics
Transient dialogue
in regards to the
efficiency metrics
Irrelevant
dialogue about
the efficiency
metrics
Algorithms
/10
Glorious
dialogue about
two light-weight
cryptographic
algorithms
Superb
dialogue about
two light-weight
cryptographic
algorithms
Good dialogue
about two
light-weight
cryptographic
algorithms
Transient dialogue
about two
light-weight
cryptographic
algorithms
Unsatisfactory
dialogue
Challenges
/10
A really clear and
in-depth
dialogue
Very clear
dialogue
Typically good
dialogue
Transient dialogue
Poor dialogue
with irrelevant
data
Conclusion
/5
A bit very
clearly
concludes the
total
contribution.
A bit clearly
concludes the
total
contribution.
Typically good
conclusion of the
report
Transient conclusion of
the report with some
relevance
Conclusion not
regarding the
report
References
/5
Clear types with
glorious supply
of references.
Clear referencing/
model
Typically good
referencing/model
Unclear
referencing/model
Lacks consistency
with many errors.
Viva voce
/10
Answered all of the
questions
appropriately
and precisely
Answered all of the
questions with
some readability
Answered all of the
questions with
little in-depth
data
Answered about
50% of the
questions.
Solutions had been
irrelevant
Does Illegal Immigration Impact Texas?
Does Illegal Immigration Impact Texas? Illegal immigration is a controversial topic that has been debated for decades in the United States. Texas, as one of the border states with Mexico, is especially affected by this phenomenon. In this blog post, we will examine the impacts of illegal immigration on Texas, both positive and negative, and […]