Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

The research project will give the graduate student an opportunity to think independently to address issues in an area of network security that is of interest to the student. The work should be documented in the form of an analytic research paper, which includes a review of the recent literature of a topic approved by me.

To get my approval, please submit a short research proposal (no more than 2 pages, double spaced) of your topic (Title, Abstract and Bibliography) by the fourth week of the course. You may supplement and/modify the references proposed in the final report. There is no grade for this proposal. However, your failure to get my blessing may lead to doing the research project "at risk." Your final report may be turned down leading to no point for the research paper.

The research project should review the literature, distill the primary issues, discuss the various possible solutions to the issues raised, identify "trends," and formulate a position. The final output is a paper, 10-12 pages double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.

The paper must use APA formatting and reference citations with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. This report is due at the end of the 11th week of the course. The paper will account for 20% of the semester grade.The paper will be graded on technical content, format, clarity, and writing skill.

EXAMPLES OF TOPICS FOR THE INDIVIDUAL RESEARCH PAPER:

• Secure Internet routing

• Distributed denial of services attacks

• Web security

• Email security

• Traffic analysis

• Wireless network security

• Mobile ad hoc network security

• Sensor network security

• Creating and managing wireless security policy

• Creating and managing firewall security policy

• Security threats in TCP/IP networks (in one or more layers)

• Securing virtualized environments

• Defining corporate mobile policies

• "Bring Your Devices" security policy

• Enterprise network firewalls - case studies and solutions

• Cloud computing security

These are only general suggestions in a random order. If you have a specific topic, in which you have interest, please describe it, so I can evaluate its suitability. Remember, that since most of the topics are very broad, you should narrow down your research to some specific subtopic or technical aspects related to the subject. Ideally, try to focus upon real situations in an organization.
POLICY ON ACADEMIC INTEGRITY (Plagiarism) and Use Of Turnitin

"Plagiarism is the intentional or unintentional presentation of another person's idea or product as one's own. Plagiarism includes, but is not limited to the following: copying verbatim all or part of another's written work; using phrases, charts, figures, illustrations, or mathematical or scientific solutions without citing the source; paraphrasing ideas, conclusions, or research without citing the source; and using all or part of a literary plot, poem, film, musical score, or other artistic product without attributing the work to its creator.

Students can avoid unintentional plagiarism by carefully accepted scholarly practices. Notes taken for papers and research projects should accurately record sources of material to be cited, quoted, paraphrased, or summarized, and papers should acknowledge these sources in footnotes."

According to the UMUC policy, in this class students are required to submit their papers to Turnitin.com. Details regarding using this service can be found in the LEO clasrrom. Please contact me for any problems you may have.

You will be required to submit your paper to Turitin and achieve a similarity index of 10 or less. You are required to submit both the research report and the Turitin Originality Report.

The penalties on plagiarism include a zero or a grade of F on the work in question, a grade of F in the course, suspension with a file letter, suspension with a transcript notation, or expulsion.

You will be required to submit your paper to Turitin and achieve a similarity index of 10 or less. You are required to submit both the research report and the Turitin Originality Report.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92215132
  • Price:- $80

Priced at Now at $80, Verified Solution

Have any Question?


Related Questions in Management Information System

Dsigning amp implementing zachmans enterprise modelling

Designing & Implementing Zachman's Enterprise Modelling Framework in Multinational Corporate Learning Outcomes: At the end of the assignment. student should be able: • To have an understanding of Zachman's Framework in d ...

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

You need an assignment about business continuity plan and

You need an assignment about Business continuity plan and disaster recovery plan: Topics covered are : - 1)- An Overview of Information Security and Risk Management 2) - Planning for Organizational Readiness 3) - Conting ...

Please respond to student 150-250 words do you agree or

Please respond to student 150-250 words ...do you agree or disagree One of the concepts that were interesting to me was the idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Inte ...

Assignment1 you have been asked to help promote a new bill

Assignment 1) You have been asked to help promote a new bill in your state, to which there is much opposition to this bill. Discuss what distributive bargaining is. Discuss the pros and cons which might arise toward the ...

Youre working for a local coffee shop that offers free

You're working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public ...

Question in roughly 200 words - explain how organizations

Question : In roughly 200 words - Explain how organizations determine what an "acceptable" level of risk is, and how this plays a role in risk management and continuity planning. The response must be typed, single spaced ...

Please discuss what you believe is the relationship of ea

Please discuss what you believe is the relationship of EA and enterprise systems. In particular, please discuss: 1. How enterprise architecture and enterprise systems influence, support, and enable an organization's abil ...

One key objective of the compliance plan in a healthcare

One key objective of the compliance plan in a healthcare organization is to create a secure and effective reporting process, thereby avoiding qui tam lawsuits against the facility. What is a qui tam lawsuit, and how can ...

Dscussion ethics and information management using

Discussion: Ethics and Information Management Using University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please no ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As