Topic cloud computing security

Assignment Help Basic Computer Science
Reference no: EM13701814

Topic Cloud Computing Security.
Research Paper Instructions
1. Summary of Research Paper Instructions

  • A Research Paper, worth 25% of your total grade

Your paper should be between 12-15 pages, double-spaced, exclusive of cover, title page, table of contents, appendices and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your Assignment Folder prior to the submission deadline.

Read further instructions below under the section entitled "3. Detailed Research Paper Instructions".

Important Note on Using Turnitin:-

You need to use the Turnitin plagiarism prevention system in completing the research paper to ensure your paper is your original work. Detailed instructions for using Turnitin can be found under Course Content> General Information module> Using Turnitin.


The topic proposal can be a short paragraph or a full page abstract stating what research question will be answered (or what problem will be solved) by the analysis your paper proposes to perform. In other words your topic proposal should define the focus of the paper by stating a question or describing a problem to be analyzed in the Information Assurance domain. It should also explain what types of resources and references will be used to perform the analysis to answer this question or solve the stated problem. Note that the references or sources found early may not be the same references you choose to use in the final paper. An adequate literature search will include at least five (5) reputable scholarly sources such as those available through the UMUC online library. It is anticipated that reputable Internet sources will also be helpful and appropriate.

2. Detailed Research Paper Instructions

Your Research Paper needs to focus on one or more themes covered in this INFA 670 capstone course. Being a capstone course it gives you an opportunity to incorporate knowledge from other INFA courses which you have taken. It needs to be strongly emphasized that your paper must not be "recycled" from previous INFA courses, even if written by you. To do so is unacceptable and will result in a "zero grade" for the assignment.

The research paper should be focused on one or more specific topic areas covered in this course. You are required to research a specific issue in your chosen topic area concentrating on analyzing the issue and evaluating the available solutions to the issue. The paper needs to discuss the corresponding benefits and limitations of these solutions and then provide recommendations.

For example; Session 4 covers vulnerability analysis in five subheadings:

Vulnerability Analysis

  • Penetration Studies
  • Vulnerability Classification
  • Frameworks
  • Certification of Information Systems
  • Accreditation of Information Systems


Your research paper could focus on an issue that spans one or more of the above subheading topics. Your task would be to analyze your chosen specific issue in Vulnerability Analysis corresponding to your chosen subheading topics and then produce a research report on same.

The reference to Session 4 above is for example only. It does not mean you must base your research paper on the Session 4 subtopics, although one could choose to do so. Feel free to focus your research paper on other sessions (Sessions 1,2,3,5,7,8,9,10,11) which may cover issues and topics which are of more interest or perhaps more applicable to your present endeavors.

Alternatively you may find it appropriate to focus your research on an issue spanning two or more session topics. As a hypothetical example, you could conceivably analyze a commercial software tool (Session 10) targeted at performing software verification and validation (Session 9).
Your Research Paper must demonstrate graduate-level writing ability and comply with the format requirements of the Publications Manual of the American Psychological Association. Careful attention should be given to source citations, proper listing of references, and the presentation of tables and graphs. Be sure to carefully cite (using correct APA-Style in-line
A final note on source citations and the use of reference material in your research paper: It is expected that much of the information you put in your paper will relate to topics which are new to you. For this reason it is also expected that you will rely heavily at times on material found through references discovered in your research. It is essential that you give proper attribution to these sources of information. You should not quote extensively from your sources, but instead should express the ideas found in your own words, applying them to the specific points you are making in your paper. Short word-for-word excerpts are acceptable, but should always be placed in quotation marks to clearly indicate a verbatim use of source material.
Your instructor is extremely well-read in the subject areas addressed in this course, and it is generally quite apparent when a given section of content originates from a source rather than that of the author, so please be diligent about using source material appropriately. It is always better to err on the side of too much citation rather than too little.
Papers for this course must meet the following criteria:

  • Papers must be your original work.
  • Papers must not be "recycled" from previous courses, even if written by you.

• The emphasis of papers must be analytical, i.e. the paper should pose a research question or problem, and attempt to answer the question or problem with an analysis of available sources and reference material, as well as your own perspective.
• Research papers must NOT seek merely to summarize the relevant details of a topic, even if that topic is new to the writer. The value in this assignment is in reaching a sufficient understanding of a set of material to allow you to provide an informed opinion on some application of the material to a specific issue.
The Research Paper will be graded against the following criteria:

  • Clear statement of thesis to be analyzed and its relevance: 15%
  • Technical Content (depth and accuracy of information and analysis): 40%
  • Recommendation, answer, or conclusion supported by research and analysis: 15%
  • Clarity, Organization, grammar and spelling: 15%
  • APA Style: 15%

Please be sure to spell check and carefully proof read your paper prior to submitting it.
End Research Paper Instructions

Reference no: EM13701814

Questions Cloud

Find how close to the fixed charge does the particle get : A positive charge of 5.00 µC is fixed in place. How close to the fixed charge does the particle get before it comes to rest and starts traveling away
Explain the three general sources of security threats : Explain the three general sources of security threats
What basic steps are required for analyzing data using micro : Write a 200 word response that answers the following questions: What basic steps are required for analyzing data using Microsoft®Access®? How could these steps help you diagnose and troubleshoot Microsoft®Access®errors? Which of the five steps presen..
The company has several branch offices : The company has several branch offices. Each branch is identified by a branch_number. The name, address (street, city, ZIP), and revenue_target of each branch office are maintained. Each branch has a designated branch manager and the branch man..
Topic cloud computing security : Topic Cloud Computing Security. Research Paper Instructions 1. Summary of Research Paper Instructions
The class is analysis and design of information systems : Guidelines: Grading will include content supported with examples, research and references with in-text citations, grammar and spelling. A minimum of 250 words is required.
Software engineering code of ethics : 1. "Software Engineering Code of Ethics and Professional Practice" Please respond to the following:•Describe one of the eight principles of the ACM Software Engineering Code of Ethics and Professional Practice and explain why the principle is impo..
Locate vendors of biometric products : Using the Web, locate vendors of biometric products. Find one vendor with a product designed to examine each characteristic mentioned in your textbook. What is the CER associated with each product? Which would be more acceptable to users? Which..
Twice the bicarbonate concentration : In water open to the atmosphere (CO2 = 390 ppmv), at what pH must the water be buffered so that the carbonate concentration is twice the bicarbonate concentration?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How components of computer system interact in system

How do components of computer system interact within system? What improvements or additions to system do you believe would benefit you or make system more user-friendly?

  Which item is template argument

Consider this function call: DoThis (3.85) a. Which item is template argument? b. Which template is function argument? c. Could the call be written as DoThis(3.85)?

  Intentional and unintentional plagiarism

What is the difference between intentional and unintentional plagiarism

  Write a menu driven program

Write a menu driven program that allows the user to enter five numbers and then choose between finding the smallest , sum or average of the numbers.

  Convert the decimal integer

Convert the decimal integer -24 to 16 bit and 32 bit two's complement hexadecimal representation. show your calculations.

  Discuss reasons unix® internet commands remained mostly same

Discuss some of the reasons UNIX® Internet commands have remained mostly the same since the creation of the Internet

  Write a method called sumarray

Write a method called sumArray that takes in as a parameter an array of integers x and returns an integer. Your method should return the sum of all the values stored in x .

  Are there any potential performance penalties

Would there be any situations where individual permissions would be used? In doing so, are there any potential performance penalties when using individual permissions?

  What arguments make for single language for all programming

What arguments can you make FOR the idea of a single language for all programming domains? "For" the idea, not the against!

  Create an new windows form application

Create an new windows form application. Add 2 controls that can display multi-line text. Use the application to enter data into an ArrayList (or you can initialize the arrayList via the application).

  Solve equations and show that no solution exists

Solve the following equations for x and y or show that no solution exists. Show your work (in particular, what division must you carry out to solve each case). (i) 5x + 23  6 mod 47

  Create a gantt chart that is based on the details

Create a work plan listing the tasks that will need to be completed to meet the system's requirements - Create a Gantt chart that is based on the details of your work plan. You may use any drawing/presentation/project management tool with which you ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd