Write a problem statement for the master thesis topic

Assignment Help Computer Engineering
Reference no: EM133675060

Homework: Information Security

Part I

1. Write a problem statement for this Master Thesis Topic.

Endpoint Security Solution protecting Remote Work Environment.

2. Provide at least 6-8 research questions for the research topic. Understand that you need to be very proficient, so you may be unable to tackle multiple big problems using endpoint security solutions to protect remote work environments. Your research question needs to test a very small problem, so narrow it down and direct it to the point. It must be completed in a very short amount of time.

For example, do not use research questions like, "What strategy should organizations use to protect their remote work environment from threats?" and "What are the key features and functionalities of endpoint security solutions that are most effective in protecting remote work environments?" These are vast questions with nearly unlimited answers.

You need to find a simple problem within the endpoint security solutions such as Zero Trust Architecture (ZTA), Virtual Private Network (VPN), Multi-factor Authentication (MFA), etc, and develop an action to fix that problem. In this method, you are only left with developing new software; at least, the Research Questions should clearly delineate this new software you are developing.

*NOTE: You are limited in what methods we can use. Most people do not have sufficient time to go to an institutional review board (IRB) for approval to perform any capstone research involving human subjects. Thus, the methods you select to test your research question cannot include research methods involving human subjects, such as online surveys or interviewing people. You cannot use statistical analysis because institutional Review board Approval was not sought for statistical analysis.

Part II

This part of the discussion aims to formalize the research method you will use to achieve your goals and provide the initial application or system design.

1. Prove to your audience that your problem statement and research question are achievable using a well-supported and accepted research methodology from scholarly literature.

2. The research method should detail how you will answer your research question and the formal process you will use to design your prototype.

3. Find at least three scholarly articles that use your selected research methodology and support your research methodology to address your research question(s).

4. Justify why this research method will work and how it will answer your research question.

5. Include a minimum of one-use case description with detailed flows and sub-flows and the correlated activity diagram and class diagram of your application of the system prototype.

6. Embed screenshots of the diagrams in your post.

Reference no: EM133675060

Questions Cloud

How long has craig tucker been using the coupons : How long has Craig Tucker been using these coupons? Do the file creation or modification dates align with the time Tucker allegedly obtained the coupons?
How will you recognize the clinical manifestations : What is the worse negative outcome that could happen to your patient? How will you recognize the clinical manifestations?
Updating data during the life of a project : Manage, since it has no predefined data model, is not always organised and may comprise multiple types. For example, data from thermostats, sensors
Management of national forests influenced by Wilderness Act : How is the management of national forests influenced by the Wilderness Act? The National Forest Management Act?
Write a problem statement for the master thesis topic : Write a problem statement for this Master Thesis Topic. What strategy should organizations use to protect their remote work environment from threats?
Changing exercise behavior among patients with diabetes : In measuring the effect of SMS messages on changing exercise behavior among patients with diabetes in the intervention group,
Compare impact of globalization on healthcare organizations : Appraise effective leadership strategies that you can implement in health care delivery. Compare the impact of globalization on healthcare organizations,
Examine the role of technology in evolution of cryptography : Examine the role of technology in the evolution of cryptography. Explain the role symmetric algorithms play in securing network protocols.
Simulate use case and consolidate your practical knowledge : Simulate this use case and consolidate your practical knowledge of Python, Google Colab, and machine-learning approaches for causal inference

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down the binary representation of the largest number

Write down the binary representation of the largest number of lives that can be stored in this system.

  Implement the function invert_fun

Implement the function invert_fun(complex_fun, complex_val) that takes a np.poly1D object complex_fun and a complex number complex_val

  State diagram to the design process

Whodunit would like your company to design a system to help them categorize, sort, store, and otherwise manipulate the thousands of artifacts they collect using your well-known expertise in object-oriented analysis and plan . Additional informatio..

  Find out what tasks are assigned to each phase

A project includes Analysis, Definition, Design, Implementation, Maintenance, and Support phases. How do we determine what tasks are assigned to each phase.

  List the basic features of a common electronic mail system

List the basic features of a common electronic mail system. What are the duties of ESMTP, POP3, and IMAP when referring to e-mail systems?

  What is project control list and describe various project

What is project control? List and describe the various project control techniques Explain cost control and schedule indexes What is a project closure Describe

  Evaluate the usefulness related to ability to predict attack

Research the practice of threat modeling and evaluate the usefulness related to the ability to predict attacks. 500 words, APA required, SafeAssign used.

  Compare two architectural styles

Consider their flexibility, how easy they are to understand and use, and quality of applications they might  produce. Discuss any experiences you have had using these patterns. How has your prior training and preparation influenced your evaluation..

  Create a view that will display each manager

Create a view that will display each manager with all of their subordinates. You will need to use aliases for table names to create a view based on a recursive

  Explain how iteration works in the project

Develop a project schedule that includes at least two (2) phases and twelve (12) tasks under the Agile delivery framework through the use of MS Project.

  Address your strategy for the given in a 2- to 3-page memo

the company offsite 2-day training session project is about ready to enter the execution phase. however management has

  Find the number of students having greater score

Find the average marks if the class and also find the number of students having greater score then average score of class.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd