Is the research informed by primary sources of theories

Assignment Help Computer Network Security
Reference no: EM13791323 , Length:

Write the Research paper about future of Cyber Security with focus on IDS and layered security.

Your paper should include a description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future, and a discussion of how this technology will affect the choices you would make if you were making purchase recommendations for a client.

Although there is room for personal opinion in your paper, you must justify your conclusions. Firewall policies and methodologies Intrusion Detection Routing protocols Wireless network quality of services Compare layer 2 wireless network with layer 2 wired-line network Comparing transport layer protocols - more than TCP and UDP Service Oriented Architecture (SOA) Network virtualization Video and Voice over Internet (VVoIP) or Voice over Internet (VoIP) Cellular network infrastructure Big Data Fog Computing Cloud Computing The Internet of Everything (IoE) Network management Disaster Recovery Quality of Services (QoS) at different layers Cyber security

Note: Most of the listed topics are very broad, so you should narrow your research to some specific technical aspects related to the subject.

Research Paper Guidelines Discussion Topic I'm Done The different types of research can be classified as Theoretical, Empirical, and Evaluation. Theoretical research is focused on explaining phenomena through the logical analysis and synthesis of theories, principles, and the results of other forms of research such as empirical studies.

Empirical research is focused on testing conclusions related to theories. Evaluation research is focused on a particular program, product or method, usually in an applied setting, for the purpose of describing, improving, or estimating its effectiveness and worth. Research methods are broadly classified as Quantitative and Qualitative.

Quantitative research includes experimental, quasi-experimental, correlational, and other methods that primarily involve collection of quantitative data and its analysis using inferential statistics such as t-tests, ANOVA, correlation, and regression analysis.

Qualitative research includes observation, case studies, diaries, interviews, and other methods that primarily involve the collection of qualitative data and its analysis using grounded theory and ethnographic approaches.

The Case Study method provides a way of studying human events and actions in their natural surroundings. It captures people and events as they appear in their daily circumstance. It can offer a researcher empirical and theoretical gains in understanding phenomena. You, as an adult learner, bring a wealth of expertise to your studies.

This knowledge and skills should be used to formulate a research paper that raises new questions, new possibilities, and regards existing problems from a new angle. Effective research compares, contrasts, analyzes, evaluates, synthesizes, and integrates information rather than simply reports it.

It should contains references to and examples of various theorists, theories, ideas, philosophies, being compared and contrasted as well as synthesized and integrated within your work.

The research paper must demonstrate scholarly treatment of the material that the student has selected for further study. It goes without saying that the research paper must be free of spelling and grammatical errors. References must be cited correctly using APA style. Research studies must include a Breadth and Depth components.

In the Breadth component, you should demonstrate familiarity with broad theoretical and conceptual topic area and provide an overview of major theories, theorists, and schools of thought. The Depth section should promote understanding of latest research and build on theory presented in the Breadth section; it should be designed to foster greater depth, development and detail in examination of one or more aspects that has already been introduced.

Checklist While developing the Research Paper, the following questions should be used as a checklist: Does the research deal with significant and meaningful problem that lends itself to a substantial research effort?

Is there a justification that demonstrates why the problem is worth studying? Is it clear who or what will be aided by research findings? Will the findings provide a basis for generalized conclusions or have practical applicability?

Is the purpose of the research expressed clearly? Is the research question or hypotheses stated concisely and explicitly? Does it logically flow from the problem? Are limitations of the study identified with recognition of their consequences? Are technical terms well defined? Are definitions clear and unambiguous? Is the theoretical framework related to previous research? Is previous work on the topic critically appraised?

Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained?

Is data analysis complete and presented logically? Are conclusions and recommendations useful and tied to findings?

Verified Expert

Reference no: EM13791323

Questions Cloud

Describe each level of maslow’s hierarchy : Describe each level of Maslow's Hierarchy
Describe how the concepts of leadership and management : Describe how the concepts of leadership and management differ from each other. In what areas do they overlap? Explain how the goals of management and leadership may sometimes overlap. As a nurse leader, do you believe you can expand your influence..
Problem related to corporate finance : There have been many articles in the last decade about large corporations and the golden parachute packages given to the executives. Discuss one example of a publicized golden parachute package in the last decade. What are the advantages and disad..
The painting department uses first-in first-out : The Painting Department had 12,000 incomplete units in its beginning Work-in-Process Inventory which were 100% complete as to materials and 30% complete as to conversion costs. 36,000 units were received from the previous department. complete as to m..
Is the research informed by primary sources of theories : Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained - Is data analysis complete and presented logically..
Prepare a financial reporting income statement : Prepare a Financial Reporting income Statement(that is, in the form required under GAAP for U.S. external reporting). Determine income in the manner used in cost-volume-profit analysis using equation 2.2 profit=revenue-Variable costs-fixed costs
Write a problem statement about making a dog house : Write a problem statement about making a dog house that is made of newspaper. Steps of writing a problem statement: restate the problem..
What are the common decision traps : What are the common decision traps which each group in point (2) is susceptible to? Develop a matrix or decision tree in order to compare the groups. How does the program impact the consumer's "regret"
Differences between open and closed source programs : Discuss the differences between open and closed source programs. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Recognize the various ways that agency or organization

cyber security power point presentation using the information you learned from modules 1 and 2 create a powerpoint

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  What are the possible flaws in this protocol

Identify which security requirement was violated in the cases and what are the possible flaws in this protocol? Propose how to fix the possible flaws with minimal modifications to the protocol.

  Assignment on internet hacking

The topic is internet Hacking it should be at least 6 to 8 body pargraph, I just waana let you now that im not native english speaker so plese have easy vocabulary

  Find an united states based online article regarding it risk

Find an United States based online article (or resource) regarding IT risk assessment, cyber law, OR auditing

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Create and submit a security policy

Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd