Address issues related to cybersecurity

Assignment Help Computer Network Security
Reference no: EM133088047

Problem Statements and Research Questions

PART A

The moodle shell for this week contains two example research papers produced by researchers at the University of Ballarat (Federation University's predecessor) - "Understanding victims of identity theft: A Grounded Theory approach" and "Zero-day malware detection based on supervised learning algorithms of API call signatures". Both papers address issues related to cybersecurity, but they take very different approaches as they use different research paradigms.

As a group, look through these two papers and determine what the key aspects of their problem statement are (these may not be directly stated as a Problem Statement, but can be determined from the Abstract and Introduction sections). For each paper establish:
• What is the problem area?
• What is the aim of the paper?
• What (if any) scoping restrictions are placed on the research?
• What are the research questions? (these may be stated explicitly, or may be implied).

Which paper takes a quantitative approach and which is qualitative? What aspects of the research problem led the researchers to adopt these approaches?

PART B

Perform a similar analysis for some of the papers which you have previously identified during your literature review search. Consider these critically - are the research questions well aligned with the stated aims of the research?

When you have identified the problem statement and research questions for each paper, show these to your tutor so they can provide feedback on your analysis of the paper.

PART C

Based on what you have learnt about problem statements and the literature reading you have done so far, start drafting a problem statement and research questions for your own project. Discuss these with your classmates and tutor.

Don't worry if they aren't perfect at this point. The problem statement and research questions will evolve over the next few weeks as you continue your literature review.

After the lab class

Keep searching for and reading relevant papers related to your chosen topic. Continue working on the Synthesis Matrix assignment which is due in Week 4, and continue to refine the problem statement and research questions which you drafted during this lab class.

Attachment:- Problem Statements and Research Questions.rar

Reference no: EM133088047

Questions Cloud

What are the total equities available : Glo expects sales for 2002 to be P2,000,000, resulting in a return on sales of 10%. What are the total equities available
Analysis of qualitative data : Process of coding which underpins the analysis of qualitative data. While you won't actually be carrying this coding process out as part of assessment
What is the balance of construction in progress account : What is the balance of construction in progress account at the end of the 2020 under percentage of completion method
What is the key difference between IFRS and GAAP : What is the key difference between IFRS and GAAP in terms of financial reporting relative to the Statement of Operations (Income Statement)
Address issues related to cybersecurity : Perform a similar analysis for some of the papers which you have previously identified during your literature review search
What is the seat turnover breakeven of the restaurant : The variable expenses on each menu is 20% of the price. The total fixed costs of the restaurant are 350 000 USD. What is the seat turnover breakeven
Describe six audit risks : Describe SIX audit risks, and explain the auditor's response to each risk, in planning the audit of Blister Pharmaceuticals Co.
Prepare the cost of production report : Prepare the cost of production report that shows the physical flow of units, equivalent units of production, cost per equivalent units & cost reconciliation
Prepare journal entries to account for the bond : Prepare journal entries to account for the bond from 1 January 2020 until 31 December 2024. N Ltd has a financial reporting date of 31 December

Reviews

Write a Review

Computer Network Security Questions & Answers

  What additional steps would you recommend to runa

Runa Singh is the network administrator in charge of network security for a medium-sized company. The firm already has a firewall, its network is divided.

  Article about network security

Write a 1 Page summary on an article about network security

  Review some of the recent vulnerability announcements

Review some of the recent vulnerability announcements from CERT, SANS, or similar organizations. Classify the type of buffer overflow used in each.

  How can we determine sle if there no percentage given

How can we determine SLE if there no percentage given? Which method is easier for determining the SLE: - a percentage of value lost or cost per incident

  Define the security strategies of defense in depth

In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy

  Perform security exploits on web applications and websites

SIT704 - Advanced Topics in Digital Security - Perform security exploits on web applications and websites and you may choose to use WebGoat and any appropriate tools from the SIT704 CloudDeakin course website to complete this assignment.

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  Difference between a private key and a secret key

Explain the difference between a private key and a secret key and describe and explain, at least, seven different physical characteristics

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security

  Write about new security tools and techniques

ISCG 7400 Computer Systems Security - You need to write about NEW SECURITY TOOLS and TECHNIQUES

  Provide a detailed security plan for the ci sector

Provide a detailed Security plan for the CI Sector, from Technical security perspective - write a paper on how you would secure sector from an attack.

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd