Ask Computer Network & Security Expert

Write the Research paper about future of Cyber Security with focus on IDS and layered security.

Your paper should include a description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future, and a discussion of how this technology will affect the choices you would make if you were making purchase recommendations for a client.

Although there is room for personal opinion in your paper, you must justify your conclusions. Firewall policies and methodologies Intrusion Detection Routing protocols Wireless network quality of services Compare layer 2 wireless network with layer 2 wired-line network Comparing transport layer protocols - more than TCP and UDP Service Oriented Architecture (SOA) Network virtualization Video and Voice over Internet (VVoIP) or Voice over Internet (VoIP) Cellular network infrastructure Big Data Fog Computing Cloud Computing The Internet of Everything (IoE) Network management Disaster Recovery Quality of Services (QoS) at different layers Cyber security

Note: Most of the listed topics are very broad, so you should narrow your research to some specific technical aspects related to the subject.

Research Paper Guidelines Discussion Topic I'm Done The different types of research can be classified as Theoretical, Empirical, and Evaluation. Theoretical research is focused on explaining phenomena through the logical analysis and synthesis of theories, principles, and the results of other forms of research such as empirical studies.

Empirical research is focused on testing conclusions related to theories. Evaluation research is focused on a particular program, product or method, usually in an applied setting, for the purpose of describing, improving, or estimating its effectiveness and worth. Research methods are broadly classified as Quantitative and Qualitative.

Quantitative research includes experimental, quasi-experimental, correlational, and other methods that primarily involve collection of quantitative data and its analysis using inferential statistics such as t-tests, ANOVA, correlation, and regression analysis.

Qualitative research includes observation, case studies, diaries, interviews, and other methods that primarily involve the collection of qualitative data and its analysis using grounded theory and ethnographic approaches.

The Case Study method provides a way of studying human events and actions in their natural surroundings. It captures people and events as they appear in their daily circumstance. It can offer a researcher empirical and theoretical gains in understanding phenomena. You, as an adult learner, bring a wealth of expertise to your studies.

This knowledge and skills should be used to formulate a research paper that raises new questions, new possibilities, and regards existing problems from a new angle. Effective research compares, contrasts, analyzes, evaluates, synthesizes, and integrates information rather than simply reports it.

It should contains references to and examples of various theorists, theories, ideas, philosophies, being compared and contrasted as well as synthesized and integrated within your work.

The research paper must demonstrate scholarly treatment of the material that the student has selected for further study. It goes without saying that the research paper must be free of spelling and grammatical errors. References must be cited correctly using APA style. Research studies must include a Breadth and Depth components.

In the Breadth component, you should demonstrate familiarity with broad theoretical and conceptual topic area and provide an overview of major theories, theorists, and schools of thought. The Depth section should promote understanding of latest research and build on theory presented in the Breadth section; it should be designed to foster greater depth, development and detail in examination of one or more aspects that has already been introduced.

Checklist While developing the Research Paper, the following questions should be used as a checklist: Does the research deal with significant and meaningful problem that lends itself to a substantial research effort?

Is there a justification that demonstrates why the problem is worth studying? Is it clear who or what will be aided by research findings? Will the findings provide a basis for generalized conclusions or have practical applicability?

Is the purpose of the research expressed clearly? Is the research question or hypotheses stated concisely and explicitly? Does it logically flow from the problem? Are limitations of the study identified with recognition of their consequences? Are technical terms well defined? Are definitions clear and unambiguous? Is the theoretical framework related to previous research? Is previous work on the topic critically appraised?

Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained?

Is data analysis complete and presented logically? Are conclusions and recommendations useful and tied to findings?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91361410
  • Price:- $80

Priced at Now at $80, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As