Preview

Network Security

Satisfactory Essays
Open Document
Open Document
302 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security
Objectives

Written Assessment : 2,000 and 3,000 words
This assessment item relates to the course learning outcomes 1,2,4 and 5 as stated on Page 1.
The document guidelines are as the following:
Mobile Application Project
Project Description
• What is the Application concept?
• How do you think that this application is different from the existing one in the market?
• Who are your target audience?
• Discuss correlation between target audience and target device.

Project Objectives
• Why there is a need to develop this application?
• Who will benefits from this application?
• What are you trying to establish from this application?

Outcomes/Deliverables
• What platform is the application developed for? o Native app or web app? o Android/iOS/Blackberry OS/Windows/Symbian? o Target device – Mobile phone/tablets? o Recommended device - specific mobile device brand and model, or group of models? o Cross brands and models?

Application User flowcharts
• Create a user flow chart for your Mobile application:
Example - http://www.rff.com/flowchart_samples.htm

Application Interface
• Describe each interface of your application.
• Digitally depict each of the interfaces.

Control Description
• What sort of input device is able to be used for the application? How is the user actions mapped to the input device?

Overall Project Timeline
• Plan your project within 12 weeks duration. You can use Gantt chart or table to show your plans.

References
Please use appropriate referencing style.

Submission: Document file (.doc / docx ) through Moodle site.

Marking criteria:
The assessment criteria for this assignment are presented in the following table. Penalties will be applied for late submission, viruses, and failing to comply with the assignment’s requirements

Criteria Mark

Application Description / Concept 7
Outcomes/Deliverables 7
Application user Flow-charts 7
Application Interface Mockup and Control Descriptions 7

You May Also Find These Documents Helpful

  • Good Essays

    Please see page 4 for an explanation of the Scores and Topics to Review sections…

    • 1157 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    International Marketing

    • 420 Words
    • 2 Pages

    Tutorials (6 & 8), readings and lectures (9) will assist students in how to complete assessment 2.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Ilm Work Based Assignment

    • 2096 Words
    • 9 Pages

    Below I have made a Gantt chart to help plan and organize the project against time.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Eqality and Diversity unit 4

    • 2569 Words
    • 11 Pages

    Please note that this Assessment document has 5 pages and is made up of 3 Parts.…

    • 2569 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    essay mechanics

    • 1204 Words
    • 5 Pages

    The purpose of this assessment is to assess the student in the following learning outcomes: Satisfactory…

    • 1204 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Window Tinting

    • 307 Words
    • 2 Pages

    It is Certificate II level, as learners are required to read, apply, and use the skills they learn. Assessment must be direct observation of the task.…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Course Guide

    • 1272 Words
    • 6 Pages

    This is a summary of the assessment in the course. For detailed information on each assessment, see 5.2 Assessment Detail below.…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Assessment criteria are specifically related to the learning outcomes and the relevant skillsbased set of those outcomes are repeated here:S1. An ability to develop ability to collect, analyze and reformat information from…

    • 1336 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    STUDY CASE: Mashaweer

    • 1118 Words
    • 4 Pages

    What Kinds of applications are described in this case? What business functions do they support?…

    • 1118 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The researchers intend to develop the proposed application using Android platform, because it is free and increasingly being used by many people.…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Advanced Java

    • 60547 Words
    • 243 Pages

    Advanced Programming for the Java(TM) 2 Platform Training Index Advanced Programming for the Java 2 Platform TM By Calvin Austin and Monica Pawlan November 1999 [CONTENTS] [NEXT>>] [DOWNLOAD] Requires login Early Access Downloads…

    • 60547 Words
    • 243 Pages
    Powerful Essays
  • Powerful Essays

    Online Faculty Evaluation

    • 3212 Words
    • 13 Pages

    This project proposal entitled “” submitted to the Institute of Computer Science, University of the Philippines University Los Baños in partial fulfillment of the requirements for the degree Master of Information Technology is hereby accepted.…

    • 3212 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    international business

    • 985 Words
    • 4 Pages

    Assessment Framework Page 5 6. Grading System Page 6 7. Quality Assurance Page 6 8.…

    • 985 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Internet Security

    • 1915 Words
    • 8 Pages

    Over the last decade, the Internet has put the rest of the world at reach because of computers. In the same way it also made computers more reachable by the rest of the world as well. The Internet is subject to widespread attacks ranging from worms, hackers, spoofing, spam, and phishing; just to name a few. Every computer device is susceptible and vulnerable to security attacks and those attacks can be just as detrimental to an organization as it is to an individual. Organizations of all sizes want and need to secure their network connectivity to their data and applications because of the need to collaborate both inside and outside the organization. Because of the security risk vulnerability it poses, organizations need requirements established to maintain its integrity for all its valuable data. Not only is information security important to an organization but also its information is valuable to its consumers who information that it must protect.…

    • 1915 Words
    • 8 Pages
    Powerful Essays