threats attacks and vulnerabilities of mobile devices
Assignment Guidelines
Course Code: CS685
Course Title: Information Security Legal and Ethical Issues
Subject: Threats, attacks and vulnerabilities of mobile devices
You are requested to write review, survey or state-of-art article within the domain of following topics. Your article has to give an overview of existing literature in a field, often identifying specific problems or issues and analyzing information from available published work on the topic with a balanced perspective. Review articles can be of four types, broadly speaking opinion, literature reviews, systematic reviews, comparison or fields analyses.
Guidelines:
- The template of the article can be found in https://www.ieee.org/conferences/publishing/templates.html
- Your article 3-6 pages inclusive references.
- At least, 10 of your references must to be from journal articles published in well publishers’ databases; IEEE, Springer, Elsevier, Wiley and Taylor & Francis.
Course Materials: Santos, C. (2019). Developing cybersecurity programs and policies (3rd ed.). Pearson IT Certification. ISBN: 9780789759405
- High Importance Note:
The submission should be 100% the students’ work. It is about writing a short paper, so students must do a survey of the literature and must do it by themselves. At grading, it will be easy to recognize who did the work and who copied it online. We will use plagiarism tools. These tools are used by conferences and journals to detect whether submitted papers contain copied and pasted sections and sentences.
———–
I need also a simple PowerPoint presentation.