Discussion of the anticipated field research method

Assignment Help Computer Networking
Reference no: EM131645169

Network security involves protecting the networking infrastructure from cybercrime by use of physical or software preventive measures. Nowadays educational institutes are prone to the cyber-attack, attacker may target university database such includes personal information of the student, faculty, and everyone related to the institution. For this action research paper, I am doing research on my undergraduate education institute Rajiv Gandhi University, India. University will be having lots of security issues like security breach, malicious attack, data loss and many more. I will be focusing on network security issues and preventive methods to implement proper controls to safeguard the university most valuable information. I will take the help of network security admin Uday Kumar and Rajiv to find out the network security problems and work towards the controlling the security issues.

And also to complete 3 pages of methodology.you must include below things.

The methodology section must include:

At least, five (5) verifiable professional (subject matter experts) or scholarly references

A discussion about the origin, evolution, and current status (published literature cannot be older than five (5) years) of your selected research methodology and why this methodology is appropriate for technological research

A discussion of the anticipated field research method or methods that you may use during your research

A discussion, at the end of the section, describing why your selected methodology is more appropriate than, at least, one other methodology for researching your topic

Reference no: EM131645169

Questions Cloud

Nation imports from producers in other countries : The price elasticity of supply of a basic commodity that a nation imports from producers in other countries is 2.
Assume that the income elasticity of demand : Assume that the income elasticity of demand for hot dogs is -1.25 and that the income elasticity of demand for lobster is 1.25.
How has the organization contributed to the quality movement : Outline any membership requirements and benefits. How has the organization contributed to the quality movement. Examine advantages of each organization.
Determine the proportion of first-half revenues : DaimlerChrysler recently sold its Chrysler division to a private equity firm. Before the sale, it reported its firsthalf revenues (in $billions) as follows.
Discussion of the anticipated field research method : Network security involves protecting the networking infrastructure from cybercrime by use of physical or software preventive measures
Rate of discount for a given future value : 1.) What is the relationship between present value and the rate of discount for a given future value?
A short essay with arguments on waltzs case : A short essay with arguments on Waltz's case for "more will be better" and Sagan's case for "more will be worse"
Matching demand and supply : Which of Porter's five forces is most applicable. Assess the effect of OTAs on airline industry competition, prices, and profitability.
The political parties and the electoral process : Identify three to four (3-4) ideological differences between America's two (2) major political parties.

Reviews

Write a Review

Computer Networking Questions & Answers

  Create an overall lan/wan configuration and troubleshooting

Create a portion of this guide each week with the final documents due in Week Five.For Week Three, a new requirement has been added to ensure that all users have both voice and video capability from their computers to those of all other users in t..

  Design the layout of users domains trusted domains

design the layout of users domains trusted domains anonymous users etc for a start-up open source software company abc.

  Explain the existing security situation in the organization

Explain the design approach and rationale. Prove that the design meets the data rate requirements. Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks.

  What is the critical path and why is it so important

What is the critical path and why is it so important for project manager

  What is the purpose of an optical attenuator

Why is a tunable laser of importance in optical networking?

  Define a computer virus

Anti-virus software is used to keep your computer free from viruses. Define a computer virus.

  What is the difference between routing and forwarding

What is the difference between routing and forwarding and What are the two most important network-layer functions in a datagram network

  What routing protocol is suitable for retail customer

What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  Define organization implementing a vpn solution

From a very practical point, create a list of attributes you would expect to be present at any organization implementing a VPN solution for the first time. Then, explain the differences in attributes you would choose for a pharmaceutical company ..

  How to interconnect two areas using tenbaset

Given that both engineering and front office areas use 10BaseT (twisted-pair Ethernet), how might you interconnect those two areas? Explain what meduim guarantees immunity from interference?

  Computing successive values of congestion window

Determine successive values of congestion window in bytes?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd