Posts

Showing posts from May, 2019

IT Security

Image
MITS 5004
IT SECURITY
Assignment-3


Assignment 3

Research and Presentation on security vulnerability tools using Kali Linux
1. Group Formation
For this assignment, students need to form groups of 4 to 5 members under the supervision of Lecturer/Tutor. Each group must be formed of 4 to 5 students. In case there is a small group (such as with remaining two students), then the Lecturer/Tutor can rebalance the groups to ensure that there are no “small” groups.
2. Topic Selection
Each group needs to select one of the following security vulnerability testing tools of Kali Linux on a first come first served basis:
·Hydra
·Maltego
·NMap
·Zed Attack Proxy
·SqlMap
·Metasploit Framework
·

Engineering Coursework help

Assignment No 2
1.Convert the binary data “011010” into analog waveform using following modulation techniques:
a.Two level Amplitude Shift Keying
b.Two level Frequency Shift Keying
c.Two level Phase Shift Keying
d.Differential Phase shift keying
e.Four level Amplitude Shift Keying
f.Four level Phase Shift Keying
g.Eight level Amplitude Shift Keying
2.With fc = 500 kHz, fd = 25 kHz, and M = 16 (L = 4 bits), compute the frequency assignments for each of the sixteen possible 4-bit data combinations.
3.Draw the approximate Analog Modulation and Frequency Modulation waveforms in complete steps for the following signal:
4.Draw the 16 QAM Constellation Diagram having two different amplitude levels and eight different phase levels.
5.Explain and draw the Error Detection Process for Cyclic Redundancy Check (CRC).
6.Compute the frame check sequence for the following information:

Behavioral Marketing

Image
Browsing your favorite blogging site or reading some interesting content and you surprisingly notice some ads on the webpage - Isn’t this the same product that you were looking for on an online store a few days back? Why not check it again as you really like this one?

Behavioral marketing also called behavioral targeting, checks the prior online behavior of users to decide which ads they would like to see again. This involves a higher level of advertisement customization, allowing businesses to understand and utilize the needs and behavior of consumers for targeting specific products to them. Targeted ads seem exciting to you as they keep in mind your personal preferences to show relevant messages. By understanding the use of behavioral marketing campaigns, businesses can market their products to a more interested audience. Unlike direct marketing where companies send the same content to all the customers, behavioral marketing sends customized messages that instantly interest you. It us…

Australian Electric Supply (Case Study)

                                 ICT700
Systems Analysis
Task 2

Assessment and Submission Details
Marks: 35% of the Total Assessment for the Course

Case Study: Australian Electric Supply
Background:
Australian Electric Supply (OZES) is a young business that supplies and distributes electrical equipment throughout Australia. In addition to selling brand new equipment, OZES has casual employees known as associate brokers that buy and sell second hand electrical equipment. They do this trading through online retail and auction portals such as eBay and Gumtree, and part of the brokers job is to choose the best portal for an item, the listing price and reserve in negotiation with the customer and the length of time the item would be listed for. They list the items for sale under OZES but they earn income by taking 20%-40% of the sales profit as a commission depending on the sales price. Before an item is put up for sale the item is delivered to OZES by the broker for quality control and then OZES…

Case Study

ICT710
ICT Professional Practice & Ethics
Task 3
2019 ATMC Semester 1
Assessment and Submission Details
Marks: 40% of the Total Assessment for the Course
Assignments should be submitted via SafeAssign.
Please follow the submission instructions on Blackboard.
All assignments will be checked for plagiarism and/or collusion between individuals.
Refer to the assignment rubric on Blackboard for the marking criteria and standards. The assignment will be marked out of a total of 100 marks.
Refer to your course outline or the course Blackboard web site for a copy of the “Student Misconduct, Plagiarism and Collusion” guidelines.
Requests for an extension to an assignment MUST be made to the Course Coordinator prior to the date of submission and requests made on the day of submission or after the submission date will only be considered in exceptional circumstances.
Case Study: Westfield
Background:

Westfield’s Australian ‘searchable mall’ featuring 100,000 products online
•The Westfield Group harnessed th…

Content Analysis Assignment

Assignment Overview
This assignment has three major aims:
·To help students gain good understanding of all ITECH7400 material.
·To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of concepts.
·To encourage students to conduct independent investigation into related topics from books, the Internet, and through practical investigation.
Engagement with this assignment should help students to prepare for the weekly multiple choice tests (10%), the theory test (0%) in week 8 and the end of semester examination (60%).
Timelines and Expectations
Students are required to analyse the weekly lecture material of weeks 1 to 8 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis should not exceed ten (10) A4 sides of paper.
Suggestions as to possible inclusions in your content analysis will appear in weekly Work Plan documents on Moodle.
The aim of this as…