Is the research informed by primary sources of theories

Assignment Help Computer Network Security
Reference no: EM13791323 , Length:

Write the Research paper about future of Cyber Security with focus on IDS and layered security.

Your paper should include a description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future, and a discussion of how this technology will affect the choices you would make if you were making purchase recommendations for a client.

Although there is room for personal opinion in your paper, you must justify your conclusions. Firewall policies and methodologies Intrusion Detection Routing protocols Wireless network quality of services Compare layer 2 wireless network with layer 2 wired-line network Comparing transport layer protocols - more than TCP and UDP Service Oriented Architecture (SOA) Network virtualization Video and Voice over Internet (VVoIP) or Voice over Internet (VoIP) Cellular network infrastructure Big Data Fog Computing Cloud Computing The Internet of Everything (IoE) Network management Disaster Recovery Quality of Services (QoS) at different layers Cyber security

Note: Most of the listed topics are very broad, so you should narrow your research to some specific technical aspects related to the subject.

Research Paper Guidelines Discussion Topic I'm Done The different types of research can be classified as Theoretical, Empirical, and Evaluation. Theoretical research is focused on explaining phenomena through the logical analysis and synthesis of theories, principles, and the results of other forms of research such as empirical studies.

Empirical research is focused on testing conclusions related to theories. Evaluation research is focused on a particular program, product or method, usually in an applied setting, for the purpose of describing, improving, or estimating its effectiveness and worth. Research methods are broadly classified as Quantitative and Qualitative.

Quantitative research includes experimental, quasi-experimental, correlational, and other methods that primarily involve collection of quantitative data and its analysis using inferential statistics such as t-tests, ANOVA, correlation, and regression analysis.

Qualitative research includes observation, case studies, diaries, interviews, and other methods that primarily involve the collection of qualitative data and its analysis using grounded theory and ethnographic approaches.

The Case Study method provides a way of studying human events and actions in their natural surroundings. It captures people and events as they appear in their daily circumstance. It can offer a researcher empirical and theoretical gains in understanding phenomena. You, as an adult learner, bring a wealth of expertise to your studies.

This knowledge and skills should be used to formulate a research paper that raises new questions, new possibilities, and regards existing problems from a new angle. Effective research compares, contrasts, analyzes, evaluates, synthesizes, and integrates information rather than simply reports it.

It should contains references to and examples of various theorists, theories, ideas, philosophies, being compared and contrasted as well as synthesized and integrated within your work.

The research paper must demonstrate scholarly treatment of the material that the student has selected for further study. It goes without saying that the research paper must be free of spelling and grammatical errors. References must be cited correctly using APA style. Research studies must include a Breadth and Depth components.

In the Breadth component, you should demonstrate familiarity with broad theoretical and conceptual topic area and provide an overview of major theories, theorists, and schools of thought. The Depth section should promote understanding of latest research and build on theory presented in the Breadth section; it should be designed to foster greater depth, development and detail in examination of one or more aspects that has already been introduced.

Checklist While developing the Research Paper, the following questions should be used as a checklist: Does the research deal with significant and meaningful problem that lends itself to a substantial research effort?

Is there a justification that demonstrates why the problem is worth studying? Is it clear who or what will be aided by research findings? Will the findings provide a basis for generalized conclusions or have practical applicability?

Is the purpose of the research expressed clearly? Is the research question or hypotheses stated concisely and explicitly? Does it logically flow from the problem? Are limitations of the study identified with recognition of their consequences? Are technical terms well defined? Are definitions clear and unambiguous? Is the theoretical framework related to previous research? Is previous work on the topic critically appraised?

Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained?

Is data analysis complete and presented logically? Are conclusions and recommendations useful and tied to findings?

Verified Expert

Reference no: EM13791323

Questions Cloud

Describe each level of maslow’s hierarchy : Describe each level of Maslow's Hierarchy
Describe how the concepts of leadership and management : Describe how the concepts of leadership and management differ from each other. In what areas do they overlap? Explain how the goals of management and leadership may sometimes overlap. As a nurse leader, do you believe you can expand your influence..
Problem related to corporate finance : There have been many articles in the last decade about large corporations and the golden parachute packages given to the executives. Discuss one example of a publicized golden parachute package in the last decade. What are the advantages and disad..
The painting department uses first-in first-out : The Painting Department had 12,000 incomplete units in its beginning Work-in-Process Inventory which were 100% complete as to materials and 30% complete as to conversion costs. 36,000 units were received from the previous department. complete as to m..
Is the research informed by primary sources of theories : Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained - Is data analysis complete and presented logically..
Prepare a financial reporting income statement : Prepare a Financial Reporting income Statement(that is, in the form required under GAAP for U.S. external reporting). Determine income in the manner used in cost-volume-profit analysis using equation 2.2 profit=revenue-Variable costs-fixed costs
Write a problem statement about making a dog house : Write a problem statement about making a dog house that is made of newspaper. Steps of writing a problem statement: restate the problem..
What are the common decision traps : What are the common decision traps which each group in point (2) is susceptible to? Develop a matrix or decision tree in order to compare the groups. How does the program impact the consumer's "regret"
Differences between open and closed source programs : Discuss the differences between open and closed source programs. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Examine the contents of the security and privacy tabs

Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

  What is the decrypted plaintext

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  What are the common tools used for denial of service

What are the common tools used for denial of service and How does a SQL injection attack take place

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  Provide a least two examples of security knowledge

Provide a least two examples of security knowledge that would assist you in preparing for or preventing a threat. Explain the time-sensitive nature of the knowledge.

  Critique the transition process performed by the dms

Critique the transition process performed by the DMS in the case study. Then, recommend two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

  Describe the process used in restoring

Describe the process used in restoring the scrambled bits and insert plain text in the assignment - hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you.

  Describe malicious things over a computer network

Suppose Ali and Jim are sending packets to each other over a computer network. Suppose Thomas positions himself in the network so he can capture all packets sent by Ali and send whatever he wants to Jim; he can also capture all the packets sent by..

  What will be the minimal length of the key

If Encrypt-It-Rite would like to increase the average cracking time to at least 100 years, what will be the minimal length of the key?

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd