0% found this document useful (0 votes)
28 views

IE3022 Assignment 1

This document provides an assignment for a literature review on cybersecurity threats and mitigations in the healthcare sector, with an emphasis on IoMT security and software-defined networking. Students are asked to write an 8-10 page paper in IEEE format reviewing at least 15 sources on the topic. The paper should include sections on an abstract, introduction, research statement/objectives, literature review, future research, and conclusion. Strict guidelines are provided around plagiarism, citations, formatting, and submission.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

IE3022 Assignment 1

This document provides an assignment for a literature review on cybersecurity threats and mitigations in the healthcare sector, with an emphasis on IoMT security and software-defined networking. Students are asked to write an 8-10 page paper in IEEE format reviewing at least 15 sources on the topic. The paper should include sections on an abstract, introduction, research statement/objectives, literature review, future research, and conclusion. Strict guidelines are provided around plagiarism, citations, formatting, and submission.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Sri Lanka Institute of Information technology

BSc (Hons) in Information Technology - 2023

IE3022-Applied Information Assurance


Cyber Security - Year 3, Semester 2
Assignment 01

Assignment Title Review Paper on Cyber Security threats and mitigations in the
Healthcare Sector with emphasis on IoMT security and Software
Defined Networking
Assignment Mode Individual
Setter Kanishka Yapa
Date Set 02/09/2023
Dead line 02/10/2023
Assessment Category Continuous Assessment
Maximum Marks 100 Marks
Contribution to the Final 30%
Grade
Mode of Submission Electronic submission of the Paper (http://courseweb.sliit.lk)

Assignment Overview:

A literature review may be published as an independent report or as part of a larger report. The
purpose of both is to provide information on current publications about a particular topic.
Literature reviews are highly condensed and heavily documented. In this assignment, you are
required to write a review paper for “Cyber Security threats and mitigations in the Healthcare
Sector with emphasis on IoMT security and Software Defined Networking” by reviewing past
literature relevant to the topic.

A literature review is a report/article which describes the “literature” (that is, the important
source material) on a particular topic. A literature review also helps you synthesize literature on
your topic because in the process of writing a literature review, the writer learns to,
(1) identify various important issues/questions raised in the literature, and
(2) sort and categorize experts’ views according to the issues/questions identified in the
literature.
The primary purpose of the report/article is to provide your target audience with an overview of
what the experts are saying about the problem under investigation. Your report will update your
target audience on the recent research in the field. Completion of this assignment will build your
skills in the following areas: critical reading, evaluation, analysis, synthesis, report organization,
use and integration of sources, and IEEE documentation. Developing these skills will demonstrate
great progress toward achieving our course goals.

What to Hand in:

In order to successfully complete the assignment:

Complete a comprehensive search of the library databases to identify at least 15 journal articles
that you will include as references in your review. You may also use internet sites very sparingly.
Write the review in light of your point of view. Your paper must include the following:

1. Review Paper Title


2. Author’s Information
3. Abstract
4. Index Terms: Keywords of the research area
5. Introduction. What are you writing about? How many people are impacted? Who are
these stakeholders? Significance of the topic.
6. Research statement/ objectives: “This paper reviews the literature
surrounding…implications for cybersecurity (or something like that). Tell the reader
exactly what you are going to address.
7. Review of the literature: Expand on the stuff that you talked about in the intro and thesis
statement, Use current and classic studies, include subtopics for clarity, You must address
a current topic in cyber security and to what extent the research activities are carried out
in the topic, implications for research,
8. Future research: Is there enough research about the topic? Where are we lacking (future
research) in research relevant to the topic? What research do you feel needs to be
conducted?
9. Conclusion
10. Appendix: if any available
11. Acknowledgement
12. References: More than 15 published materials/ internet sources should be present and
must follow IEEE referencing style.
13. Author profile: include your picture and give the reader an understanding about you, your
areas of expertise The words in bold are your headings. You MUST use headings, if you do
not use headings, your paper will be returned ungraded and you will be required to
resubmit your paper. It will be considered late.
Requirements (NOT suggestions) for Paper

Paper must be in IEEE format. Citations must be used. This is a research paper, therefore all
information must be cited. You must cite multiple times within the same paragraph, even if you
are citing only one source. Citing once at the end of the paragraph is not acceptable.

 Plagiarism will NOT be tolerated. You MUST reword the information and CITE it (yes, you
must cite if you reword). Copying and Pasting without rewording is plagiarism and will not
be tolerated (even if it is cited). If it is not your original thought or general knowledge (sun
is yellow, sky is blue…) then it must be cited.

 Do not make statements such as “LSB is a primitive algorithm in data hiding” without
citing it. You were not the first to think of this. If more than 5 sentences in a row are
copied and pasted you will not receive credit for that section. See syllabus for academic
integrity policy. Do not use direct quotes. Papers with more than one direct quote
(maximum 2 sentences) will have points deducted.

 Do not use “I”, “We”, or “this researcher” or “you” statements. Do not begin sentences
with “also”, “also too” ,“so”.

 You must use at least 15 sources. You must include a reference page and title page and
both must be in IEEE format. Do not cite your instructor or any other instructor-or their
slides or class notes

 You must have headings. Papers without headings will be returned for correction and
considered late.

 Papers submitted for other classes may not be submitted for this class. If you submit a
paper for this class that has been submitted for other classes you will receive a failing
grade.

 You may submit the paper to the link available on courseweb. All review papers will be
uploaded to turnitin.com and make sure it is your best work. No rewrites will be granted.

 No late submissions are acceptable and entertained.

 The finished paper will be approximately 8-10 pages in length (including references).
Document formatting

The format of the article is available (Templates for Transactions heading) in the link given below:
http://www.ieee.org/publications_standards/publications/authors/author_templates.html

Evaluation Criteria Marks Allocated


Abstract 10
Introduction 10
Research statement/ objectives 10
Review of the literature 30
Future research 10
Conclusion 10
References (IEEE in-text and reference list) 10
Clarity of the paper. Use of grammar, 10
language and scholarly work
Total 100

You might also like