The research proposal is about my current research project titled "Study on Cyber Security: Establishing a Sustainable Information Security Framework for University Automation System"
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework for University Automation System
1. What Do You Think?
Security is a journey?
Or
A destination?
According to Microsoft Vice President Dave Thompson,
“Security is a journey, not a destination.”
2. “Study on Cyber Security:
Establishing a Sustainable Cyber Security
Framework for University Automation System”
Presentation on
Supervised By
M.M. Rakibul Hasan
Lecturer
Department of Computer Science and Engineering
Prepared By
Rihab Rahman
ID: SECRET
Program: BCSE
Kaisary Zaman
ID: SECRET
Program: BCSE
3. Table of Content
Introduction
Background of Study
Problem Statement
Rationale of Study
Research Objective
Research Methodology
Data analysis tools
Test and Evaluation
Plan of Work
Time Schedule
Cost Estimation
Limitation of research work
Future Works of the
Research
Conclusion
Bibliography
3
5. Data Security - The process of protecting the data from
unauthorized users, preventing alterations and restricting the
access of sensitive information[1].
5
Background of Study
8. Rationale of Study
To let people know about the importance of cyber security
because in today’s technology-based world is a very vast
thing.
To cope up with this situation we should read this paper
titled as “Study on Cyber Security: Establishing a Cyber
Security Framework for University Automation System.”
It will be helpful to develop idea and model about information
security of university level institution.
8
9. Research Objective
Broad Objective: The broad objective of our research is to propose a
cyber security framework for the university automation system so that
we can ensure the safety of the confidential information of the
university.
9
Specific Objective:
1.Identify the sensitive and confidential information to protect.
2.Identify whose are the stakeholder of the sensitive and confidential
..information.
3.Identify lacking and security threats of running automation system.
4.Propose a security framework to ensure the future safety of the
system
10. Research Methodology
As we are studying on some frameworks to propose a new one
therefore, we are following comparative research methodologies.
It studies to identify, analyses and explain similarities and
differences across various cyber security frameworks.
10
Collect
Data
Study
Existing
Security
Framework
Propose
New
Framework
Check
efficiency
of new
framework
Get final
Result
Figure: Sequence of Research Work
12. Test and Evaluation
Collect some data security models to study on their efficiencies,
….advantages and limitation
Propose a model with comparatively less limitations
Test the proposed method with real life situation to justify the ….
…. efficiencies, advantages and usability than pervious models. 12
13. Plan of Work
Step 1: Area specification.
Step 2: Identify the Problem.
Step 3: Review the Literature.
Step 4: Methodology – interview, observations.
Step 5: Develop criteria's to compare.
Step 5: Analysis and interpreting data.
Step 6: Documenting Result & evaluation.
Step 7: Conclusion and recommendation. 13
14. Time Schedule
14
Work List / Week Distributions
Feb Mar Apr May June July Aug Sep
Area Specification
Identify the Problem
Review the Literature
Methodology – Interview, Observation
Develop Criteria’s to Compare
Analysis & Interpreting Data
Documenting Result & Evaluation
Conclusion and Recommendation
16. Limitation of the Research Work
Not getting permission for collecting all the required information.
Less resources for conducting the research.
Lack of required technologies to analysis data and
Not getting real life environment to test the framework.
16
17. Future Works of the Research
Properly utilize the given time period.
Perform all the formalities to get access of necessary
information to work on for the research.
Be sure of the required resources to conduct the research
and therefore collect them accordingly.
Revise and evaluate the research work time to time for better
correctness and appropriateness.
17
18. Conclusion
By completing the research we will discover about the security
threats that may corrupt the confidential information of university
automation system. We will do a comparative search among the
security frameworks and therefore we will propose a new model
that will be more efficient and effective to ensure data security of
university level large institution.
18
19. Bibliography
1. Laudon, Kenneth C., and Jane Price Laudon. Management Information
Systems: Managing the Digital Firm. Verlag Nicht Ermittelbar, 2014.
2. Thuraisingham, Dr. Bhavani. “Data and Applications Security: Developments
and Directions.” Annual International Computer Software and Applications
Conference , 2002.
3. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in
Cloud Computing. "IEEE International Conference on Circuits and Systems
(2017):76-81.
4. Mindmajix. “List Of Cybersecurity Frameworks.” Mindmajix, Mindmajix
Technologies INC, 7 Sept. 2017, mindmajix.com/cyber-security-
frameworks
19
20. Bibliography
5. Aviel , Rubin D. and Geer Jr Daniel E. "A Survey of Web Security." IEEE
International Symposium on Advanced Research (1998): 34-41.
6. Craggs, Barnaby and Rashid Awais. "Smart Cyber-Physical Systems:
Beyond Usable." ACM 3rd International Workshop on Software
Engineering for Smart Cyber-Physical Systems (2017).
7. Nader, Sohrabi Safa, et al. "Information security collaboration formation
in organisations." IET Information Security (2018): 238-245. Document.
8. Wade , Baker H. and Wallace Linda. "Is Information Security Under
Control? Investigating Quality in Information Security Management."
IEEE COMPUTER SOCIETY (2007): 36-44. Document. 23 April 2019.
20
21. Bibliography
9. Rajeswari, S. and R. Kalaiselvi. "Survey of Data and Storage Security in
Cloud Computing." IEEE International Conference on Circuits and Systems
(2017): 76-81.
10.Techopedia. Cybersecurity. 10 March 2018. Online. 10 March 2019.
<https://www.techopedia.com/definition/24747/cybersecurity>.
11. Ward, R. and P Skeffington. "Network Management Security." IEEE
(1990): 173-180.
12.Wikipedia. Cyberspace. 13 February 2019. Digital. 10 March 2019.
<https://en.wikipedia.org/wiki/Cyberspace>.
13.Wikipedia.. Security. 6 March 2019. Online. 10 March 2019.
<https://en.wikipedia.org/wiki/Security>.
21