Discussion of the anticipated field research method

Assignment Help Computer Networking
Reference no: EM131645169

Network security involves protecting the networking infrastructure from cybercrime by use of physical or software preventive measures. Nowadays educational institutes are prone to the cyber-attack, attacker may target university database such includes personal information of the student, faculty, and everyone related to the institution. For this action research paper, I am doing research on my undergraduate education institute Rajiv Gandhi University, India. University will be having lots of security issues like security breach, malicious attack, data loss and many more. I will be focusing on network security issues and preventive methods to implement proper controls to safeguard the university most valuable information. I will take the help of network security admin Uday Kumar and Rajiv to find out the network security problems and work towards the controlling the security issues.

And also to complete 3 pages of methodology.you must include below things.

The methodology section must include:

At least, five (5) verifiable professional (subject matter experts) or scholarly references

A discussion about the origin, evolution, and current status (published literature cannot be older than five (5) years) of your selected research methodology and why this methodology is appropriate for technological research

A discussion of the anticipated field research method or methods that you may use during your research

A discussion, at the end of the section, describing why your selected methodology is more appropriate than, at least, one other methodology for researching your topic

Reference no: EM131645169

Questions Cloud

Nation imports from producers in other countries : The price elasticity of supply of a basic commodity that a nation imports from producers in other countries is 2.
Assume that the income elasticity of demand : Assume that the income elasticity of demand for hot dogs is -1.25 and that the income elasticity of demand for lobster is 1.25.
How has the organization contributed to the quality movement : Outline any membership requirements and benefits. How has the organization contributed to the quality movement. Examine advantages of each organization.
Determine the proportion of first-half revenues : DaimlerChrysler recently sold its Chrysler division to a private equity firm. Before the sale, it reported its firsthalf revenues (in $billions) as follows.
Discussion of the anticipated field research method : Network security involves protecting the networking infrastructure from cybercrime by use of physical or software preventive measures
Rate of discount for a given future value : 1.) What is the relationship between present value and the rate of discount for a given future value?
A short essay with arguments on waltzs case : A short essay with arguments on Waltz's case for "more will be better" and Sagan's case for "more will be worse"
Matching demand and supply : Which of Porter's five forces is most applicable. Assess the effect of OTAs on airline industry competition, prices, and profitability.
The political parties and the electoral process : Identify three to four (3-4) ideological differences between America's two (2) major political parties.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd