Address issues related to cybersecurity

Assignment Help Computer Network Security
Reference no: EM133088047

Problem Statements and Research Questions

PART A

The moodle shell for this week contains two example research papers produced by researchers at the University of Ballarat (Federation University's predecessor) - "Understanding victims of identity theft: A Grounded Theory approach" and "Zero-day malware detection based on supervised learning algorithms of API call signatures". Both papers address issues related to cybersecurity, but they take very different approaches as they use different research paradigms.

As a group, look through these two papers and determine what the key aspects of their problem statement are (these may not be directly stated as a Problem Statement, but can be determined from the Abstract and Introduction sections). For each paper establish:
• What is the problem area?
• What is the aim of the paper?
• What (if any) scoping restrictions are placed on the research?
• What are the research questions? (these may be stated explicitly, or may be implied).

Which paper takes a quantitative approach and which is qualitative? What aspects of the research problem led the researchers to adopt these approaches?

PART B

Perform a similar analysis for some of the papers which you have previously identified during your literature review search. Consider these critically - are the research questions well aligned with the stated aims of the research?

When you have identified the problem statement and research questions for each paper, show these to your tutor so they can provide feedback on your analysis of the paper.

PART C

Based on what you have learnt about problem statements and the literature reading you have done so far, start drafting a problem statement and research questions for your own project. Discuss these with your classmates and tutor.

Don't worry if they aren't perfect at this point. The problem statement and research questions will evolve over the next few weeks as you continue your literature review.

After the lab class

Keep searching for and reading relevant papers related to your chosen topic. Continue working on the Synthesis Matrix assignment which is due in Week 4, and continue to refine the problem statement and research questions which you drafted during this lab class.

Attachment:- Problem Statements and Research Questions.rar

Reference no: EM133088047

Questions Cloud

What are the total equities available : Glo expects sales for 2002 to be P2,000,000, resulting in a return on sales of 10%. What are the total equities available
Analysis of qualitative data : Process of coding which underpins the analysis of qualitative data. While you won't actually be carrying this coding process out as part of assessment
What is the balance of construction in progress account : What is the balance of construction in progress account at the end of the 2020 under percentage of completion method
What is the key difference between IFRS and GAAP : What is the key difference between IFRS and GAAP in terms of financial reporting relative to the Statement of Operations (Income Statement)
Address issues related to cybersecurity : Perform a similar analysis for some of the papers which you have previously identified during your literature review search
What is the seat turnover breakeven of the restaurant : The variable expenses on each menu is 20% of the price. The total fixed costs of the restaurant are 350 000 USD. What is the seat turnover breakeven
Describe six audit risks : Describe SIX audit risks, and explain the auditor's response to each risk, in planning the audit of Blister Pharmaceuticals Co.
Prepare the cost of production report : Prepare the cost of production report that shows the physical flow of units, equivalent units of production, cost per equivalent units & cost reconciliation
Prepare journal entries to account for the bond : Prepare journal entries to account for the bond from 1 January 2020 until 31 December 2024. N Ltd has a financial reporting date of 31 December

Reviews

Write a Review

Computer Network Security Questions & Answers

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

  Necessary and sufficient condition for perfect security

Show that a necessary and sufficient condition for perfect security is H(C|M) = H(C) for every set of probabilities. (Homophonic keys) Prove theorem for homophonic systems.

  Launch a nessus basic network scan against the host

CSCI 681 Lab - Statement of Work. Launch a Nessus basic network scan against the host 10.100.0.2. Identify and confirm a high rated vulnerability

  How you intend to harden and control security

As a security administrator in your organization, please outline and discuss how you intend to harden and control security to protect your organizational IT.

  Access and read e-mail from government web sites

He wants to utilize a variety of electronic tablets to access and read e-mail from government web sites (Note: Coast Guard is dual-hatted -Department of Defense and Department of Homeland Security). He has been briefed on a variety of mobile devic..

  Expose the computers to virus and worms

Some hackers even try to expose the computers to virus and worms. Moreover these persons sometimes specially design worms to distribute in peer-to-peer networks only.

  Propose plan that focuses on password policies-

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

  Discuss the network id and the host id of that address

You need to find the class of the IP address, the subnet mask, the network ID and the host ID of that address.

  Determine the impact of five potential logical threats

Identify at least five (5) potential physical threats that require attention. Determine the impact of at least five (5) potential logical threats that require attention.

  How does the wimax privacy sublayer provide security

How does the WiMAX privacy sublayer provide security for a WiMAX network? How does CSMA/CA in DCF handle media contention?

  What is the history of des and why is s-des studied

What is the history of DES, and why is s-DES studied? How does DES and 3DES work? Provide an example of each

  Prepare briefing package with approval drafts

Review the table of contents and relevant chapters in the Certified Information Privacy Professional textbook to find information about legal and regulatory

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd