Answered You can hire a professional tutor to get the answer.
The research project will give the graduate student an opportunity to think independently to address issues in an area of network security that is of interest to the student. The work should be docume
The research project will give the graduate student an opportunity to think independently to address issues in an area of network security that is of interest to the student. The work should be documented in the form of an analytic research paper, which includes a review of the recent literature of a topic approved by your instructor.
Please submit a short research proposal (no more than 2 pages, double spaced) of your topic (Title, Abstract and Bibliography). You may supplement and/modify the references proposed in the final report. The purpose of this activity and your instructor's review of your proposal is to help ensure that you have chosen a topic which can be researched (i.e. there is sufficient support in the professional literature) and which is relevant to this course and this assignment.
The research project should review the literature (professional journals and publications), distill the primary issues, discuss the various possible solutions to the issues raised, identify "trends," and formulate a position. The paper must use APA formatting, citations, and reference list with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. The paper will be graded on technical content, format, clarity, and writing skill. The rubric for the paper is as follows:
- Abstract (Short summary of problem, approach, expected/final result): 5%
- Clear statement of problem(s) investigated: 10%
- Technical Content (depth and accuracy of information and analysis, originality): 50%
- Results and Conclusion: 15%
- Clarity, organization, grammar and spelling: 10%
- Sufficient and appropriate references and their citing (in APA Style): 10%
EXAMPLES OF TOPICS FOR THE INDIVIDUAL RESEARCH PAPER:
- Secure Internet routing
- Distributed denial of services attacks
- Web security
- Email security
- Traffic analysis
- Wireless network security
- Mobile ad hoc network security
- Sensor network security
- Creating and managing wireless security policy
- Creating and managing firewall security policy
- Security threats in TCP/IP networks (in one or more layers)
- Securing virtualized environments
- Defining corporate mobile policies
- “Bring Your Devices” security policy
- Enterprise network firewalls - case studies and solutions
- Cloud computing security
These are only general suggestions in a random order. If you have a specific topic, in which you have interest, please describe it, so your instructor can evaluate its suitability. Remember, that since most of the topics are very broad, you should narrow down your research to some specific subtopic or technical aspects related to the subject. Ideally, try to focus upon real situations in an organization.Due June 11th