Write project proposal on network security research

Assignment Help Computer Networking
Reference no: EM133516159

Question: Students will form a team of two (2) people to perform this research. You are strongly encouraged to identify a good computer/network security research topic.

You need to write a 1-2 page project proposal. The format for your proposal is open.

This research will focus on AI and the network security related. pros and cons and the impact it has on society and also relations to hacking pros and cons about that if ai can prevent this or not. I would also like to add about the a game "Detroit Becomes Human" where AI demanded for rights and that will be somewhat will happen once they advance.

Mention the performance and how better it is and also it might have some flaws.
Add 3-4 links for references as well

Reference no: EM133516159

Questions Cloud

What are the factors affecting the demad : What are the factors affecting the demad? What are the factors affecting the supply side? How is this going to affect the demand curve?
Determinants of price elasticity of demand : How would you explain this difference, based on what are considered to be the determinants of price elasticity of demand.
What the author implies and how you break down : Of course they had a big party of course they were drunk! they are indians! Sherman Alexie what the author implies and how you break down the ideas),
Were you the kid who ate the marshmallow : Then share with us how does the concept being taught applies to you? Were you the kid who ate the Marshmallow? Or were you the kid who waited?
Write project proposal on network security research : Write project proposal on network security research. Research will focus on AI and the network security related. pros and cons
Conceptualize the deliverable : Evaluate whether you feel that the process of creating a mind map helped you conceptualize the deliverable that you planned
Market the home and communicate with the client : How do you plan to market the home and communicate with the client? What's included in your services and what's your fee?
Examples news of firms in perfectly competitive markets : Examples from the news of firms in perfectly competitive markets. Discuss how costs impact these firms' profitability.
Basically giving us same message : Some may say that it is not necessary to have both the laws and principles if they are basically giving us the same message.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain professional networking opportunities

A discussion on professional networking opportunities

  The concept of providing wireless access to employees

What are the limitations of powerline networks?

  Describe how symmetric encryption and decryption work

Explain how a Trojan horse works.- Compare and contrast symmetric and asymmetric encryption.- Describe how symmetric encryption and decryption work.

  Create spreadsheet analyzing cost-savings of replacing lan

Create a spreadsheet analyzing cost and savings of replacing the LAN with wi-fi network for organization of 450 people.

  Cross-functional challenges in the mobile division

Cross-Functional Challenges in the Mobile Division

  Estimate the probability of encountering an error

Go to an on-line site that sells hard disk drives, and find the largest capacity disk you can buy for less than $200. Now, track down the spec sheet.

  What are principal ingredients of a public-key cryptosystem

ITNE - 2002 - Public Key Cryptography and Message Authentication - What is a message authentication code and Briefly describe the three schemes

  What is the purpose of a disaster recovery plan

What is the purpose of a disaster recovery plan? - What are five major elements of a typical disaster recovery plan?

  Implementing an access control solution to limit access

The company was pleased with your plan for implementing an access control solution to limit access to only authorized agents of the company.

  Implement the network using packet tracer

Implement the network using Packet Tracer - Calculate the EIGRP metric from R1 to network where PC2 is located. Explain and show how you derive at the values used in the calculation. Show detailed steps in arriving your answer.

  Switching - vlans and inter-vlan routing

PAgP and LACP are negotiation protocols that dynamically configure an Etherchannel. What's the difference between them?

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd