Crypto jacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Discuss how to detect and prevent crypto jacking attacks on consumer devices.

Assessment Title Ethical issues associated with various technologies Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to comply with ULO b): Apply appropriate business communication, research standards in writing reports and in the presentation of research. Weight 10% Total Marks Assignment 1: 10 Marks (5% actual weightage) Word limit 500-700 excluding title page and reference list

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted online to AMS follow the link below you may require to login. You must submit this application three working days prior to the due date of the assignment. https://online.mit.edu.au/ams/PublicDocs/Student/MIT_Special_Consideration_Application.pdf Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: https://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and- guidelines/AcademicIntegrityPolicyAndProcedure .For further information, please refer to the Academic Integrity Section in your Unit Description. Assignment Overview Assignment 1 is a formative assessment. Assignment 1 focuses on developing an annotated bibliography for the scenario you have selected for subsequent analysis. You need to use the template provided to develop this annotated bibliography. Three research sources (1 journal papers and 1 conference paper) need to be used for this assessment. Student should ensure that the research sources they have selected are recent, preferably published within the years (2017-2021). Students must submit the assignment by Week 3 due date mentioned in this document. Assignment Topics Part A: You need to select one of the topics listed below based on your student ID ending number Students with ID ending with Topic Number 0 or 5 1 1 or 6 2 2 or 7 3 3 or 8 4 4 or 9 5 1) Cloud computing is a major shift from the traditional way businesses think about IT resources. It offers potential benefits such as cost saving and improved business outcomes. However, cloud computing also raises a variety of information security risks. Discuss the risks associated and cloud computing security considerations. 2) Crypto jacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Discuss how to detect and prevent crypto jacking attacks on consumer devices. 3) Internet of Things (IoT) is an emerging area that will help connect common objects turning them into connected devices and it promises to change the way we interact with things. The IoT paradigm is changing the way people interact with things around them. The IoT Paradigm is also making its way into the industry to support innovative services. Discuss the concepts of IoT and Industrial IoT and the challenges associated with the proliferation of IoT in industry. 4) Quantum Computing and Quantum Cryptography: Quantum computing relies on the use of quantum physics using atomic scale units called qubits which makes quantum computers faster and more efficient. Discuss the use of quantum computing for increasing cyber security and the use of quantum communication for secure telecommunications. 5) Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. WSN is a major technology enabling the Internet of Things (IoT). Discuss WSNs and security issues in WSNs. ANNOTATED BIBLIOGRAPHY TEMPLATE TO BE USED FOR PART A Article ID What issue is examined in this article? How have the authors approached this issue? i.e. research approach Discuss the relevance or usefulness of this research to your topic Discuss 3 key ideas that emerged after you have read this article to help further your research? Article #1 (Journal Paper 1) Article#2 (Conference Paper 1) Part B: In this part of the assessment will require you to conduct systematic analysis based on the scenario you have selected earlier. Structure to be used for PART B: 1.Introduction to the topic 3.Analysis of the identified issues 4.Key arguments and recommendations that emerged from the analysis 5.Conclusion 6.Reference style