Evaluate the challenges and security risk

Assignment Help Computer Network Security
Reference no: EM13992065 , Length: word count:18500

My project is two assessments (interim report) I Have Project - Information Management & Security " A Study in Security Consideration when adopting BYOD in Sultanate of Oman SMEs".

This study will show overview of adopting BYOD in Oman and evaluate the challenges and security risk they faced to understand how they integrate BYOD in to their business. this thesis also will provide a guide in Security consideration when adopting BYOD in to SMEs showing what are the risks and opportunities, security policies, current state of adopting BYOD in SMEs and what are the solutions can be provided to assist IT professionals in SMEs.

Assessment 1a Project Proposal + Ethics Form You must attach these (signed) as part of the Interim Report (maximum word 3500).

######Attached old report as example ##### Assessment 1b Submit Interim Report (Including market Surveys + Design Blueprints)

Submit interim report (including market surveys & design blueprints).

Second assessment is full porject thesis maximum word 15000.

Project Proposal Form and Ethics Form

Description of your artefact Context of project with reference to relevant existing products, services and work (ie how does your artefact relate to what other people have done)

Aim & objectives of the project

List of features that the artefact will include

Identify added value that the project provides

Identify the intellectual challenges involved

What methodology (structured process) will you be following to realise your artefact? Describe approach that will be employed to develop your project artefact (this should also show how you plan to test and evaluate the work)

Justify the appropriateness and suitability of your approach for realising your artefact

How does your project relate to your degree course and build upon the units/knowledge you have studied/acquired Highlight aspects of the project that correlate with knowledge and skills acquired from your course of study

Resources List ALL the resources required to develop your artefact
Be clear on which packages, tools, languages and environments will be used and are available on campus

FACULTY OF CREATIVE ARTS, TECHNOLOGIES AND SCIENCE

Form for Research Ethics Projects (CATSethicsform)

SECTION A Ethical Issues

Please summarise below the ethical issues involved in the research proposal and how they will be addressed. In any proposal involving human participants clear explanation of how informed consent will be obtained, how confidentiality will be observed, how the nature of the research and the means of dissemination of the outcomes will be communicated to participants must be provided.

SECTION B Check List

Please answer the following questions by circling YES or NO as appropriate.

1. Does the study involve vulnerable participants or those unable to give informed consent (e.g. children, people with learning disabilities, your own students)?

YES NO

2. Will the study require permission of a gatekeeper for access to participants (e.g. schools, self-help groups, residential homes)?

YES NO

3. Will it be necessary for participants to be involved without consent (e.g. covert observation in non-public places)?

YES NO

4. Will the study involve sensitive topics (e.g. obtaining information about sexual activity, substance abuse)?

YES NO

5. Will blood, tissue samples or any other substances be taken from participants?

YES NO

6. Will the research involve intrusive interventions (e.g. the administration of drugs, hypnosis, physical exercise)?

YES NO

7. Will financial or other inducements be offered to participants (except reasonable expenses or small tokens of appreciation)?

YES NO

8. Will the research investigate any aspect of illegal activity (e.g. drugs, crime, underage alcohol consumption or sexual activity)?

YES NO

9. Will participants be stressed beyond what is considered normal for them?

YES NO

10. Will the study involve participants from the NHS (patients or staff) or will data be obtained from NHS premises?

YES NO

If the answer to any of the questions above is "Yes", or if there are any other significant ethical issues, then further ethical consideration is required. Please document carefully how these issues will be addressed.

Attachment:- old REPORT_INTERIM.rar

Reference no: EM13992065

Questions Cloud

The farmer respond by changing his planting strategy : A farmer in Georgia has a 100-acre farm on which to plant watermelons and cantaloupes. Every acre planted with watermelons requires 50 gallons of water per day and must be prepared for planting with 20 pounds of fertilizer. Formulate an LP model for ..
Use the sandp 500 excess returns and inflation : Use the S&P 500 excess returns and inflation to predict Intel stock excess returns. Provide the regression equation for the Intel stock excess returns when using S&P 500 excess returns and inflation as explanatory variables.
Calculate the tension in a horizontal strand of spiderweb : Calculate the tension in a horizontal strand of spiderweb if the same spider sits motionless in the middle of it much like the tightrope walker in Figure. The strand sags at an angle of 15.0o below the horizontal.
What is the frequency that the firemen in the truck hear : A firetruck is approaching at a speed of 25 m/s and an observer at rest hears a frequency of 780 Hz. What is the frequency that the firemen in the truck hear? (looks like '783 Hz')
Evaluate the challenges and security risk : What methodology will you be following to realise your artefact? Describe approach that will be employed to develop your project artefact
Problem regarding the effect of the hobby : Assume that Jane itemizes her deductions and that she has an adjusted gross income of $42,000 before considering the effect of the hobby. Discuss the actual amount of the deduction Jane would receive in parts a and b.
Write an equation for sum of the forces acting on the car : If the mass of the connecting string is small compared to the other masses, F and T will be approximately equal. Use this result to combine the equations and solve for the force of friction "f" in terms of the masses and angle.
Auto for personal transportation : Doug, John's son, buys a new car that is titled in Doug's name. John pays for Doug's auto license tag. The tag costs $220: $40 for registration plus $180 in property taxes based on the value of the auto. Doug qualifies as John's dependent for tax ..
Tax-exempt interest on investments : Tracy and Brenda are equal partners in Crescent Home Furniture, which is organized as an S corporation. For the year, the company reports sales revenue of $330,000 and business expenses of $195,000. Crescent also earns $15,000 in taxable interest ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  How is the security of a firms information system affected

How is the security of a firm's information system and data affected by its people, organization, and technology

  Define a secure system in the blp model

How would you define a secure system in the BLP model - A Security Policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states.

  How asymmetric cryptography is used to provide encryption

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Write down a 1000- to 1500-word paper on at least three

write a 1000- to 1500-word paper on at least three major information security threats that a specific organization you

  Explain what is meant by authentication

In the context of information processing, computer security and trusted systems, explain what is meant by the following terms and why we want to use them: Authentication and Two factor authentication

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Contact information for next of kin

The company also keeps information about each driver, such as Social Security number, name, birthdate, and contact information for next of kin. Buses travel to only one state per visit.

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to company users.

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Content filtering and protection

How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

  Assignment on regulatory requirements and standards

Regulatory Requirements and Standards - The graduate ensures alignment of regulatory requirements and standards with appropriate information security and assurance controls for organizations that process or hold privacy, financial, or medical info..

  Explore traffic behavior when designing a network

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd