Is the research informed by primary sources of theories

Assignment Help Computer Network Security
Reference no: EM13791323 , Length:

Write the Research paper about future of Cyber Security with focus on IDS and layered security.

Your paper should include a description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future, and a discussion of how this technology will affect the choices you would make if you were making purchase recommendations for a client.

Although there is room for personal opinion in your paper, you must justify your conclusions. Firewall policies and methodologies Intrusion Detection Routing protocols Wireless network quality of services Compare layer 2 wireless network with layer 2 wired-line network Comparing transport layer protocols - more than TCP and UDP Service Oriented Architecture (SOA) Network virtualization Video and Voice over Internet (VVoIP) or Voice over Internet (VoIP) Cellular network infrastructure Big Data Fog Computing Cloud Computing The Internet of Everything (IoE) Network management Disaster Recovery Quality of Services (QoS) at different layers Cyber security

Note: Most of the listed topics are very broad, so you should narrow your research to some specific technical aspects related to the subject.

Research Paper Guidelines Discussion Topic I'm Done The different types of research can be classified as Theoretical, Empirical, and Evaluation. Theoretical research is focused on explaining phenomena through the logical analysis and synthesis of theories, principles, and the results of other forms of research such as empirical studies.

Empirical research is focused on testing conclusions related to theories. Evaluation research is focused on a particular program, product or method, usually in an applied setting, for the purpose of describing, improving, or estimating its effectiveness and worth. Research methods are broadly classified as Quantitative and Qualitative.

Quantitative research includes experimental, quasi-experimental, correlational, and other methods that primarily involve collection of quantitative data and its analysis using inferential statistics such as t-tests, ANOVA, correlation, and regression analysis.

Qualitative research includes observation, case studies, diaries, interviews, and other methods that primarily involve the collection of qualitative data and its analysis using grounded theory and ethnographic approaches.

The Case Study method provides a way of studying human events and actions in their natural surroundings. It captures people and events as they appear in their daily circumstance. It can offer a researcher empirical and theoretical gains in understanding phenomena. You, as an adult learner, bring a wealth of expertise to your studies.

This knowledge and skills should be used to formulate a research paper that raises new questions, new possibilities, and regards existing problems from a new angle. Effective research compares, contrasts, analyzes, evaluates, synthesizes, and integrates information rather than simply reports it.

It should contains references to and examples of various theorists, theories, ideas, philosophies, being compared and contrasted as well as synthesized and integrated within your work.

The research paper must demonstrate scholarly treatment of the material that the student has selected for further study. It goes without saying that the research paper must be free of spelling and grammatical errors. References must be cited correctly using APA style. Research studies must include a Breadth and Depth components.

In the Breadth component, you should demonstrate familiarity with broad theoretical and conceptual topic area and provide an overview of major theories, theorists, and schools of thought. The Depth section should promote understanding of latest research and build on theory presented in the Breadth section; it should be designed to foster greater depth, development and detail in examination of one or more aspects that has already been introduced.

Checklist While developing the Research Paper, the following questions should be used as a checklist: Does the research deal with significant and meaningful problem that lends itself to a substantial research effort?

Is there a justification that demonstrates why the problem is worth studying? Is it clear who or what will be aided by research findings? Will the findings provide a basis for generalized conclusions or have practical applicability?

Is the purpose of the research expressed clearly? Is the research question or hypotheses stated concisely and explicitly? Does it logically flow from the problem? Are limitations of the study identified with recognition of their consequences? Are technical terms well defined? Are definitions clear and unambiguous? Is the theoretical framework related to previous research? Is previous work on the topic critically appraised?

Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained?

Is data analysis complete and presented logically? Are conclusions and recommendations useful and tied to findings?

Verified Expert

Reference no: EM13791323

Questions Cloud

Describe each level of maslow’s hierarchy : Describe each level of Maslow's Hierarchy
Describe how the concepts of leadership and management : Describe how the concepts of leadership and management differ from each other. In what areas do they overlap? Explain how the goals of management and leadership may sometimes overlap. As a nurse leader, do you believe you can expand your influence..
Problem related to corporate finance : There have been many articles in the last decade about large corporations and the golden parachute packages given to the executives. Discuss one example of a publicized golden parachute package in the last decade. What are the advantages and disad..
The painting department uses first-in first-out : The Painting Department had 12,000 incomplete units in its beginning Work-in-Process Inventory which were 100% complete as to materials and 30% complete as to conversion costs. 36,000 units were received from the previous department. complete as to m..
Is the research informed by primary sources of theories : Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained - Is data analysis complete and presented logically..
Prepare a financial reporting income statement : Prepare a Financial Reporting income Statement(that is, in the form required under GAAP for U.S. external reporting). Determine income in the manner used in cost-volume-profit analysis using equation 2.2 profit=revenue-Variable costs-fixed costs
Write a problem statement about making a dog house : Write a problem statement about making a dog house that is made of newspaper. Steps of writing a problem statement: restate the problem..
What are the common decision traps : What are the common decision traps which each group in point (2) is susceptible to? Develop a matrix or decision tree in order to compare the groups. How does the program impact the consumer's "regret"
Differences between open and closed source programs : Discuss the differences between open and closed source programs. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Explain the difference between the client and the server

What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  Describe a process that would allow alice to send a message

Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

  Define social engineering security threats

Select an article relevant to current social engineering threats. Topics could include, but are not limited to, phishing, quid pro quo, or diversion theft. Research and examine current information security systems designed to address social engine..

  Result is the theft or misuse of confidential information

what is a security incident?a security incident in an organization is a serious event that can occur at any point from

  Redesign the university ip addressing space

Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses

  Authentication by a pin to access any computing system

Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the second for policies can't be enforced using technology and how managers..

  Case study incident-response policy-gem infosys

Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd