Produce a literature review paper

Assignment Help Computer Network Security
Reference no: EM131273322 , Length:

Research Paper

Scenario Your team is working for an elite digital forensics company in the UK, usually invited to investigate major security incidents involving suspected criminal activities. To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.

Assignment tasks and deliverables You have been given an assignment to produce a literature review paper. The paper should cover recent methods, procedures and tools to investigate a specific technology. To clarify further, the following topics are few examples to what you could consider:

- Electronic emails

- Email clients e.g. MS Outlook and Mozilla Thunderbird

- Mobile Phones

- Android-based devices

- Internet-of-Things (IoT)

- Electronic wearables

- GPS systems

- Wi-Fi data

- Cloud computing clients e.g. Google Drive and Dropbox

- Cryptocurrency e.g. Bitcoin

Your paper should use the IEEE template and guidelines for transactions: https://www.ieee.org/publications_standards/publications/authors/author_templates.html It is also expected that you address any ethical or legal implications related to investigating the technology you have selected. The paper should not exceed 6 pages (excluding references and appendices) The following is an outline of what should be covered:

1. Abstract: a summary of the paper's context, objective, methodology, results and conclusion.

2. Introduction: this is where you can introduce your work and discuss the problem statement e.g. a full justification behind reviewing incident response methods to the technology of your choice.

3. Background: a literature review of related research.

4. Methodology: scope and a discussion on procedure, instruments, data collection methods (etc.) used to accomplish this work.

5. Results and discussion: critical discussion and analysis [no more than 1300 words]

6. Conclusion: a summary of your key findings and what they mean to the field of Digital Forensics and Incident Response.

7. Appendix 1 - PowerPoint Presentation: clear and concise presentation on the key findings and methodology followed. [suitable for a 5 min presentation]

Verified Expert

This task is about cloud clients google drive and dropbox. It is 1800 words task and it is MS-Word report and PPT. In this report introduction, methodologies, research and discussions and conclusion are discussed in detail. IEEE referencing is done..

Reference no: EM131273322

Questions Cloud

Non profit - make a wish foundation : Name and URL of nonprofit organization. Description of two reasons that this website is effective
Explain three most critical from city management perspective : What do you consider to be the three most critical from a city management perspective and why? Please keep in mind that there is no real right or wrong answer to this. I'm just looking for a well-reasoned argument.
Nature and cost of safety regulation imposed : Is there a "mid-point" between safety regulation and the cost to the railroads and ultimately, to shippers? Should the railroad industry have input to the nature and cost of safety regulation imposed on them?
What are the implications and needs for this group : Focus on one difference in your workplace where you feel there is a need for an intervention (i.e. age, gender, disability, sexual orientation, etc.) Identify at least two resources outside of your textbook that currently support this one difference ..
Produce a literature review paper : To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.
Operations of the three major geographic regions : A large multinational company has three regional data centers to support the operations of the three major geographic regions where the company operates.
Define and explain the action research methodology : Define and explain the Action Research Methodology including its application to technology research.
What will be the counselor role with this client : What concepts of the theory make it the most appropriate for the client in the case study? Why did you choose this theory over the others? What will be the goals of counseling and what intervention strategies are used to accomplish those goals?
Employees in response to prolonged customer complaints : The company you work for is planning to provide training to its frontline employees in response to prolonged customer complaints, as well as the recent economic downturn. Acting in the capacity of ‘Assistant Training Manager’, you are asked by the Di..

Reviews

len1273322

11/11/2016 12:26:14 AM

i want research paper about cloud computing google drive and dropbox - PowerPoint Presentation: clear and concise presentation on the key findings and methodology followed. [suitable for a 5 min presentation]a summary of your key findings and what they mean to the field of Digital Forensics and Incident Response.

Write a Review

Computer Network Security Questions & Answers

  Identify the responsibilities of a project manager

Identify the responsibilities of a Project manager when participating in a real world project and define the role of management in projects, particularly from the view point of the practitioner as a member of the project team;

  Disaster-recovery processes and business-continuity planning

Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning.

  Questions on cyber security

Question 1: Submit a list of five cybersecurity breach case studies. Question 2: For each breach, write a brief statement covering the following points: a\ When did the incident take place (dates)? b\ What went wrong? c\ What was the outcome?

  Importance of explicit enterprise security policies

What is the importance of explicit enterprise security policies and procedures

  Social engineering attacks and counterintelligence

Social Engineering Attacks and Counterintelligence

  Find an article in uol library that proposes solutions

What problems do you see with this attitude, and what solutions might you suggest? For this Discussion, you will select and summarise an article in the UoL library that promotes solutions for this problem.

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Identify and explain how the breach occurred

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Why are scada systems particularly vulnerable to cyber treat

Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

  Explain policies and procedures that will be used on network

Create a memo to the company employees that describes the policies and procedures that will be used on the network. Write your memo so that it describes what the employees must do, and what the employees are not allowed to do.

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd