Prepared by: Your Name (metric card number)



Similar documents
Interpreting Web Analytics Data

Literature survey: historical and theoretical background. The chapter requires you to have done some library and company research to:

The KPI Development Framework for ICTSQ Measurement

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview

MIDLANDS STATE UNIVERSITY

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

2.1 Digital Electronics. Title: Electronics and Automatic Engineering

Information security education for students in Japan

MEM30021A Prepare a simple production schedule

WHITE PAPER ON. Operational Analytics. HTC Global Services Inc. Do not copy or distribute.

Chapter 3 Research Methodology

Now Is the Time for Security at the Application Level

Arthur Phillip High School Assessment Task 3. Course: Industrial Technology Multimedia Year: 9. Area/s of study: Website Design Task Number: 3

Στούντιο 2. Συνοπτική παρουσίαση του μαθήματος

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

CIM Level 4 Certificate in Professional Marketing

Information and Media Literacy Accessing and managing information. Integrating and creating information. Evaluating and analyzing information.

MBA Dissertation Guidelines

An Activity Based Approach to Developing Young Children s Social Emotional Competence

Applied Information Technology Department

How to Write a Project Proposal. Martyn Amos

Ecom Infotech. Page 1 of 6

Health Communication for Diabetes Programs Personal Capacity Assessment

The Total Economic Impact Of SAS Customer Intelligence Solutions Real-Time Decision Manager

How To Study Information Security

Telecommunication (120 ЕCTS)

Role of Business Intelligence in e-government: A Case Study of Swedish Municipality Contact Centers

FINAL YEAR PROJECT PROPOSAL Public Voting System

Executive Cyber Security Training. One Day Training Course

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

IB Business & Management. Internal Assessment. HL Guide Book

Comparison of K-means and Backpropagation Data Mining Algorithms

COURSE TITLE: (OLS 207) INFORMATION SYSTEMS ANALYSIS, DESIGN AND EVALUATION

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Systems Analysis and Design Life Cycle

SANS Top 20 Critical Controls for Effective Cyber Defense

Grading. The grading components are as follows: Midterm Exam 25% Final Exam 35% Problem Set 10% Project Assignment 20% Class Participation 10%

Energy Efficient Systems

Network Working Group. S. Crocker Trusted Information Systems, Inc. B. Fraser. Software Engineering Institute. November 1991

TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES

Disaster Recovery Business Continuity Premium Edition

Research Article Performance Appraisal System of Employees of Private Banking Sector in Bangladesh: A Case Study on National Bank Limited

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012

Prediction of Stock Performance Using Analytical Techniques

How to write an Academic Business Report

Critical Controls for Cyber Security.

Test-Driven Automation: Adopting Test-First Development to Improve Automation Systems Engineering Processes

Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security

Design of Wireless Home automation and security system using PIC Microcontroller

Best Practices for Fortune 500 Career Web Site Recruiting

Risk Management in the Era of BYOD

Certified Information Systems Auditor (CISA)

Course Title: Penetration Testing: Network & Perimeter Testing

Requirements Engineering: Elicitation Techniques

PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >

The most suitable system methodology for the proposed system is drawn out.

INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING

EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH

ASSESSMENT PLAN: M.S. in Computer Science

CAD and Creativity. Contents

4.1 CD BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time)

Revel8or: Model Driven Capacity Planning Tool Suite

2014 New Jersey Core Curriculum Content Standards - Technology

THE MCKINSEY GLOBAL INSTITUTE has predicted that by 2018, the US alone could face a shortage of between 140,000 to 190,000 people with deep

Comparing Agile Software Processes Based on the Software Development Project Requirements

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Assuming the Role of Systems Analyst & Analysis Alternatives

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Instructional Design and Development Activities to Develop Creative Thinking Skills of Undergraduate Engineering Students

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

IS THE INTERNET OF THINGS MAKING OUR LIVES EASIER OR MORE DIFFICULT? WHAT ARE THE OPPORTUNITIES AND CHALLENGES?

Requirements Engineering

This report provides the project s findings, including its three practical, actionable products:

The Importance of Cyber Threat Intelligence to a Strong Security Posture

manual configuration of wireless network - eduroam windows 8 Click Open Network and Sharing Center.

Today Science Journal of Humanity

Control Design & Implementation Week #5 CRISC Exam Prep ~ Domain #4. Bill Pankey Tunitas Group. Job Practice

How To Use Neural Networks In Data Mining

Scalability and Performance Report - Analyzer 2007

Information Systems and Tech (IST)

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

Analytics for Software Product Planning

Transcription:

PROJECT PROPOSAL MASTER IN COMPUTER SCIENCE (INFORMATION SECURITY) TITLE OF PROJECT YOUR CHOSEN PROJECT TOPIC Prepared by: Your Name (metric card number) Supervisor Supervisor s name Date: 99/99/9999

2 TABLE OF CONTENTS CONTENTS PAGE 1.0 Introduction. 9 1.1 Background of the problem 9 1.2 Problem Statement..9 1.3 Project Aim. 9 1.4 Project Objectives 9 1.5 Project Scope 9 2.0 Literature Review... 9 3.0 Methodology.. 9 4.0 Expected Outcome. 9 5.0 Conclusion.. 9 References.. 9 Gantt Chart.. 9

3 1.0 Introduction Introduce the reader to the area in which you will be working. This includes basic definitions and explanations geared towards your area of interest. Current statistics depicting trends to real situations are acceptable. Examples of introduction: Example 1: Developments in Information and Communication Technologies (ICTs) have impacted all sectors such To ensure effective working of information security, various controls and measures had been implemented.. However, lack of proper.. Undoubtedly, the most important of these controls is the Hence, this project examines. Example 2: A wireless local area network is. WLAN have gained popularity.. The emphasis is This project is concerned about security issues. However, this project will only focus on which. Example 3: An access control is. However, human authentication is the security task. However,. A more practical approach is to. This project implements. by using. 1.1 Background of the Problem Proceed to describe what sort of work has already been done and exactly what you propose to do, going into as much detail as possible. Indicate the technical importance and/ or interest of your proposed work. In discussing previous work you should cite references gathered in a literature search including critiques and summaries of the references read and cited.

4 1.2 Problem Statement Examples of problem statement: Example 1: A review on the list of journal listed in.. This shown that there is no research had been conducted for other aspect of.. As the is responsible for preparing the This will provide some assurance that the university s resources will be taken care and effectively protected. Hence, a study on the. with regards to.. is needed due to lack of empirical study on this area. Example 2: Wireless environment is not restricted to. Many researches carried out to. However, not all of them are effective In contrast, the proposed project is a. Example 3: Statistics showed that there is an urgent need to protect multimedia content. The estimated trade loss was. Thus to reduce the impact of threats security awareness is extremely important in 1.3 Project Aim Example 1: The aim of this study is to investigate and examine.. Example 2: The aim is to make the client and the machine authentication. Example 3: The aim is to have a Malaysian Law Enforcement policy and procedure in handling digital evidence for cyber crime cases.

5 1.4 Project Objectives It is recommended you have only three (3) objectives for your project. Some examples for Objective One: To investigate the To determine the. To examine the. To identify. Some examples for Objective two: To design.. To compare To enhance. To integrate. To automate Some examples for Objective Three: To measure To evaluate 1.5 Project Scope The scope for this study focuses on.. A laboratory-based project. Laptop To prepare a project paper, to surf internet valuable materials or references and to execute test of analysis. Will address investigation steps on major phases of digital evidences. Interview To understand and to have richer explanation on..

6 Develop Questionnaires and conduct a survey To obtain feedback from IT management and operational employee. Conducting interviews with selected. Software requirements MPLAB IDE. Use Statistical software To perform data analysis including solutions for Data Integration, Analytics and Business Intelligence i.e. SAS Statistical Analysis ver or Amos ver. 2.0 Literature Review The literature review discuses several basic knowledge. Review past researches which explore issues, theories found in scholarly writings and provides explanations, summary and critical evaluation on related works done. 3.0 Methodology How the research is going to be executed? Develop prototype / Simulation / Survey/ Interview / Focus Group/ Mixed Method 4.0 Expected Outcome Examples Model / Framework / Instrument / Prototype / Measurement / Questionnaire 5.0 Conclusion ICT provides great opportunity However, lack of security control would impede. in meeting the objectives. Failure to have a comprehensive may put the exposed to threats. Additionally, the. Therefore, there is a need for..

7 References www.sps.utm.my) (refer to Theses Manual-July, 2007 for details, found from Either use Harvard System (Author and Year system) Examples Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2010b). Resolved-Acceleration Control of Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474. Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice Hall International Ltd. Or use Number System [1] Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice Hall International Ltd. [2] Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2008b). Resolved-Acceleration Control of Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474. Appendix: Gantt Chart