Write a problem statement for the master thesis topic

Assignment Help Computer Engineering
Reference no: EM133675060

Homework: Information Security

Part I

1. Write a problem statement for this Master Thesis Topic.

Endpoint Security Solution protecting Remote Work Environment.

2. Provide at least 6-8 research questions for the research topic. Understand that you need to be very proficient, so you may be unable to tackle multiple big problems using endpoint security solutions to protect remote work environments. Your research question needs to test a very small problem, so narrow it down and direct it to the point. It must be completed in a very short amount of time.

For example, do not use research questions like, "What strategy should organizations use to protect their remote work environment from threats?" and "What are the key features and functionalities of endpoint security solutions that are most effective in protecting remote work environments?" These are vast questions with nearly unlimited answers.

You need to find a simple problem within the endpoint security solutions such as Zero Trust Architecture (ZTA), Virtual Private Network (VPN), Multi-factor Authentication (MFA), etc, and develop an action to fix that problem. In this method, you are only left with developing new software; at least, the Research Questions should clearly delineate this new software you are developing.

*NOTE: You are limited in what methods we can use. Most people do not have sufficient time to go to an institutional review board (IRB) for approval to perform any capstone research involving human subjects. Thus, the methods you select to test your research question cannot include research methods involving human subjects, such as online surveys or interviewing people. You cannot use statistical analysis because institutional Review board Approval was not sought for statistical analysis.

Part II

This part of the discussion aims to formalize the research method you will use to achieve your goals and provide the initial application or system design.

1. Prove to your audience that your problem statement and research question are achievable using a well-supported and accepted research methodology from scholarly literature.

2. The research method should detail how you will answer your research question and the formal process you will use to design your prototype.

3. Find at least three scholarly articles that use your selected research methodology and support your research methodology to address your research question(s).

4. Justify why this research method will work and how it will answer your research question.

5. Include a minimum of one-use case description with detailed flows and sub-flows and the correlated activity diagram and class diagram of your application of the system prototype.

6. Embed screenshots of the diagrams in your post.

Reference no: EM133675060

Questions Cloud

How long has craig tucker been using the coupons : How long has Craig Tucker been using these coupons? Do the file creation or modification dates align with the time Tucker allegedly obtained the coupons?
How will you recognize the clinical manifestations : What is the worse negative outcome that could happen to your patient? How will you recognize the clinical manifestations?
Updating data during the life of a project : Manage, since it has no predefined data model, is not always organised and may comprise multiple types. For example, data from thermostats, sensors
Management of national forests influenced by Wilderness Act : How is the management of national forests influenced by the Wilderness Act? The National Forest Management Act?
Write a problem statement for the master thesis topic : Write a problem statement for this Master Thesis Topic. What strategy should organizations use to protect their remote work environment from threats?
Changing exercise behavior among patients with diabetes : In measuring the effect of SMS messages on changing exercise behavior among patients with diabetes in the intervention group,
Compare impact of globalization on healthcare organizations : Appraise effective leadership strategies that you can implement in health care delivery. Compare the impact of globalization on healthcare organizations,
Examine the role of technology in evolution of cryptography : Examine the role of technology in the evolution of cryptography. Explain the role symmetric algorithms play in securing network protocols.
Simulate use case and consolidate your practical knowledge : Simulate this use case and consolidate your practical knowledge of Python, Google Colab, and machine-learning approaches for causal inference

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd