PROJECT PROPOSAL MASTER IN COMPUTER SCIENCE (INFORMATION SECURITY) TITLE OF PROJECT YOUR CHOSEN PROJECT TOPIC Prepared by: Your Name (metric card number) Supervisor Supervisor s name Date: 99/99/9999
2 TABLE OF CONTENTS CONTENTS PAGE 1.0 Introduction. 9 1.1 Background of the problem 9 1.2 Problem Statement..9 1.3 Project Aim. 9 1.4 Project Objectives 9 1.5 Project Scope 9 2.0 Literature Review... 9 3.0 Methodology.. 9 4.0 Expected Outcome. 9 5.0 Conclusion.. 9 References.. 9 Gantt Chart.. 9
3 1.0 Introduction Introduce the reader to the area in which you will be working. This includes basic definitions and explanations geared towards your area of interest. Current statistics depicting trends to real situations are acceptable. Examples of introduction: Example 1: Developments in Information and Communication Technologies (ICTs) have impacted all sectors such To ensure effective working of information security, various controls and measures had been implemented.. However, lack of proper.. Undoubtedly, the most important of these controls is the Hence, this project examines. Example 2: A wireless local area network is. WLAN have gained popularity.. The emphasis is This project is concerned about security issues. However, this project will only focus on which. Example 3: An access control is. However, human authentication is the security task. However,. A more practical approach is to. This project implements. by using. 1.1 Background of the Problem Proceed to describe what sort of work has already been done and exactly what you propose to do, going into as much detail as possible. Indicate the technical importance and/ or interest of your proposed work. In discussing previous work you should cite references gathered in a literature search including critiques and summaries of the references read and cited.
4 1.2 Problem Statement Examples of problem statement: Example 1: A review on the list of journal listed in.. This shown that there is no research had been conducted for other aspect of.. As the is responsible for preparing the This will provide some assurance that the university s resources will be taken care and effectively protected. Hence, a study on the. with regards to.. is needed due to lack of empirical study on this area. Example 2: Wireless environment is not restricted to. Many researches carried out to. However, not all of them are effective In contrast, the proposed project is a. Example 3: Statistics showed that there is an urgent need to protect multimedia content. The estimated trade loss was. Thus to reduce the impact of threats security awareness is extremely important in 1.3 Project Aim Example 1: The aim of this study is to investigate and examine.. Example 2: The aim is to make the client and the machine authentication. Example 3: The aim is to have a Malaysian Law Enforcement policy and procedure in handling digital evidence for cyber crime cases.
5 1.4 Project Objectives It is recommended you have only three (3) objectives for your project. Some examples for Objective One: To investigate the To determine the. To examine the. To identify. Some examples for Objective two: To design.. To compare To enhance. To integrate. To automate Some examples for Objective Three: To measure To evaluate 1.5 Project Scope The scope for this study focuses on.. A laboratory-based project. Laptop To prepare a project paper, to surf internet valuable materials or references and to execute test of analysis. Will address investigation steps on major phases of digital evidences. Interview To understand and to have richer explanation on..
6 Develop Questionnaires and conduct a survey To obtain feedback from IT management and operational employee. Conducting interviews with selected. Software requirements MPLAB IDE. Use Statistical software To perform data analysis including solutions for Data Integration, Analytics and Business Intelligence i.e. SAS Statistical Analysis ver or Amos ver. 2.0 Literature Review The literature review discuses several basic knowledge. Review past researches which explore issues, theories found in scholarly writings and provides explanations, summary and critical evaluation on related works done. 3.0 Methodology How the research is going to be executed? Develop prototype / Simulation / Survey/ Interview / Focus Group/ Mixed Method 4.0 Expected Outcome Examples Model / Framework / Instrument / Prototype / Measurement / Questionnaire 5.0 Conclusion ICT provides great opportunity However, lack of security control would impede. in meeting the objectives. Failure to have a comprehensive may put the exposed to threats. Additionally, the. Therefore, there is a need for..
7 References www.sps.utm.my) (refer to Theses Manual-July, 2007 for details, found from Either use Harvard System (Author and Year system) Examples Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2010b). Resolved-Acceleration Control of Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474. Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice Hall International Ltd. Or use Number System [1] Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice Hall International Ltd. [2] Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2008b). Resolved-Acceleration Control of Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474. Appendix: Gantt Chart