Assignment 1: Designing Compliance within the LAN-to-WAN Domain
Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
· Protecting data privacy across the WAN
· Filtering undesirable network traffic from the Internet
· Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
· Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
· Having an area designed to trap attackers in order to monitor attacker activities
· Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
· Hiding internal IP addresses
· Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
a. filter undesirable network traffic from the Internet
b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
d. allow for an area designed to trap attackers in order to monitor attacker activities
e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
f. hide internal IP addresses
2. Identify the fundamentals of public key infrastructure (PKI).
3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Note: The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review t.
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
1. Assignment 1: Designing Compliance within the LAN-to-WAN
Domain
Note: Review the page requirements and formatting instructions
for this assignment closely. Graphically depicted solutions, as
well as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
· Protecting data privacy across the WAN
· Filtering undesirable network traffic from the Internet
· Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
· Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
· Having an area designed to trap attackers in order to monitor
attacker activities
· Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
· Hiding internal IP addresses
· Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
1. Use MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario that will:
a. filter undesirable network traffic from the Internet
2. b. filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
c. allow for a zone for anonymous users but aggressively
controls information exchange with internal resources
d. allow for an area designed to trap attackers in order to
monitor attacker activities
e. offer a means to monitor network traffic in real time as a
means to identify and block unusual activity
f. hide internal IP addresses
2. Identify the fundamentals of public key infrastructure (PKI).
3. Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
5. Use at least three quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Note: The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS).
The format is different than other Strayer University courses.
Please take a moment to review the SWS documentation for
details.
· Include a cover page containing the title of the assignment, the
student's name, the professor's name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
· Analyze information security systems compliance
3. requirements within the Workstation and LAN Domains.
· Use technology and information resources to research issues in
security strategy and policy formation.
· Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Use MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Weight: 30%
Did not submit or incompletely used MS Visio or an open
source equivalent to graphically depict a solution for the
provided scenario.
Insufficiently used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Partially used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Satisfactorily used MS Visio or an open source equivalent to
4. graphically depict a solution for the provided scenario.
Thoroughly used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
2. Identify the fundamentals of public key infrastructure (PKI).
Weight: 15%
Did not submit or incompletelyidentified the fundamentals of
public key infrastructure (PKI).
Insufficiently identified the fundamentals of public key
infrastructure (PKI).
Partially identified the fundamentals of public key
infrastructure (PKI).
Satisfactorily identified the fundamentals of public key
infrastructure (PKI).
Thoroughly identified the fundamentals of public key
infrastructure (PKI).
3. Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Weight: 20%
Did not submit or incompletelydescribed the manner in which
your solution will protect the privacy of data transmitted across
the WAN.
Insufficiently described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Partially described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Satisfactorily described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Thoroughly described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Weight: 20%
Did not submit or incompletelyanalyzed the requirements
necessary to allow for proper operating system and application
patch management and did not submit or incompletelydescribed
5. a solution that would be effective.
Insufficiently analyzed the requirements necessary to allow for
proper operating system and application patch management and
insufficiently described a solution that would be effective.
Partially analyzed the requirements necessary to allow for
proper operating system and application patch management and
partially described a solution that would be effective.
Satisfactorily analyzed the requirements necessary to allow for
proper operating system and application patch management and
satisfactorily described a solution that would be effective.
Thoroughly analyzed the requirements necessary to allow for
proper operating system and application patch management and
thoroughly described a solution that would be effective.
5. Three references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than eight errors present
Seven to eight errors present
Five to six errors present
Three to four errors present
Zero to two errors present
9 discussions: around 200 words each one
1
"Security Challenges"
6. · Distributed applications and cloud computing have become a
viable option within the LAN-to-WAN Domain. Discuss the
primary challenges related to maintaining the security of both
applications and data in such an environment.
· Describe the controls that are needed to ensure the security of
distributed applications and data. Identify the auditing approach
that you believe is best suited to this arrangement. Provide a
rationale for your response.
2
"Remote Access"
· Remote access via Virtual Private Networks (VPN's) to
corporate resources for the purposes of e-commerce, telework
and remote administration is becoming commonplace. From an
auditing perspective, suggest two or more controls that should
be in place to prevent the loss or theft of confidential
information.
· Give your opinion on what you believe are the essential
elements of an acceptable use policy for remote access.
Elaborate on each item and justify its importance.
3
"Data Center Management"
· Imagine you are an IT security specialist of a large
organization which is opening a new data center. Recommend a
minimum of three controls, other than door locks, you would
utilize to secure the new data center physically. Support your
recommendations.
· Recommend a process to govern obtaining, testing, and
distributing patches for operating systems and applications
within the new data center. Provide your rationale.
4
"DR…What Is It Good for?" Please respond to the following:
· From the first and second e-Activities, Consider the following
scenario: Your employer, a small-business owner, has indicated
she believes that rather than planning to recover from a disaster,
it makes more sense to simply open a new business and start
anew. As a security professional and proponent of disaster
7. recovery, formulate a list of your top five concerns with this
statement and explain each. Be sure to indicate how and why
you believe these concerns are relevant for a small business.
Justify your response.
· Suppose you received pushback from your Board of Directors
while trying to explain the necessity of a disaster recovery plan
(e.g., due to costs, administrative overheard, etc.). Outline the
main points and with a rationale for each that can be used to
persuade the Board of Directors into believing that a plan really
is necessary.
5
"Preparing for Different Disasters" Please respond to the
following:
· Select two disaster scenarios (e.g., large-scale power outage,
flood, earthquake, etc.) to compare and contrast, and explain
how an implemented DR plan would differentiate when
preparing for and dealing with these disasters.
· Explain how the report structure and organization could help
the overall recovery efforts in a disaster, and determine whether
or not you believe the organization of large plans is a key
consideration for plan creators and management. Provide a
rationale for your answer.
6
"IRS Disaster Recovery Plan (DRP)" Please respond to the
following:
· From the first e-Activity, select one portion of the IRS
disaster recovery plan that you found interesting. Explain why
this portion was interesting to you, and determine whether or
not you believe this portion is critical to the overall contingency
planning efforts of the agency. Provide a rationale to support
your answer.
· Determine whether or not you believe the IRS DRP would be
comparable to that of large enterprises in the private sector
(e.g., ConocoPhillips, General Motors, etc.), and explain
whether or not you consider this to be the case.
7
8. "Hurricane Sandy DR Adaptation" Please respond to the
following:
· From the second e-Activity, determine whether or not you
believe the ability to dynamically adapt to the extreme
conditions was crucial for disaster response personnel when
faced with the challenges caused by Hurricane Sandy. Use
examples to support your answer.
· Explain how dynamic disaster plans can be created and tested.
Determine whether or not you think these plans have the ability
to be truly dynamic and assist personnel when amidst a disaster
situation.
8
"BCP versus DRP Revisited" Please respond to the following:
· Expanding on what you’ve learned since Week 2 when a
similar question was posed, explain in your own words the
difference between business continuity planning and disaster
recovery planning, and where you believe these two processes
differ and overlap.
· Take a position on whether BC or DR can survive without the
other. Use a real-world example to support your position.
9
"BCP by FEMA" Please respond to the following:
· From the e-Activity, determine what you believe is the most
critical component of BCP from FEMA’s implementation /
suggestions for the BCP process. Justify your answer.
· Determine whether or not you believe the BCP process would
be successful without proper BIA processes being conducted.
Explain why or why not.
Running head: Research Prospectus 1
Research Prospectus 6
9. Research Prospectus
Name:
Course:
Instructor’s Name:
Date:
Proposal 1 (First choice)
Topic- The superstar factor: Celebrity influence on American
political campaigns.
Introduction
In the 2016 American Presidential elections, the job of political
influencing was, in part, at the hands of a body of individuals
lacking political experience; the celebrities. Each of the two
candidates, Donald Trump and Hillary Clinton, enjoyed the
support of a large number of celebrities, with each celebrity
cashing in on their fan base to endorse the candidate of their
choice. Besides that, one of the candidates, Donald Trump, had
acquired celebrity status owing to his career in reality
television. Therefore, celebrity politics was a significant factor
in the 2016 presidential campaigns.
The proposed study considers the impact that celebrities have
on political campaigns, especially their influence on the quality
of the political discourse around the elections. It considers
questions such as: what value do celebrities bring to political
campaigns?, and where do celebrities derive their political
influence despite lacking political experience? However, the
primary research question addressed by the proposed research is
“to what extent do the celebrities enhance or dilute the political
discourse?” The preliminary thesis statement based on the
review of existing literature on “celebrity politics” is:
“celebrities are formidable campaign machinery used by
10. politicians to sway voters because of their large following, but
to a significant extent, they dilute rather than enhance the
political discourse owing to the tendency of the celebrities to
convert the political conversation from an issue-based one to a
populist contest, their lack of political experience and the fact
that they subjugate the average voices in the political
discourse.”
Upon further research, this thesis statement will be revised to
reflect the extent to which the detriment to the political
discourse manifests.
Literature Review
The proposed research examines the impact of celebrities on the
political discourse when the celebrities either participate
directly in politics or when the influence the political outcome
through the endorsement of their favored candidates. First, the
key constructs of the research will be defined. Secondly, the
research on the sources of influence for the celebrity politicians
and political influencers, as well as the value that the influential
celebrities bring to the political campaigns will be discussed.
Finally, the relevant research on the perceived effect of the
celebrity politics on the political discourse, both the positive
and the negative, will be outlined.
Definition of terms
The primary construct that the proposed research relies on
is “celebrity politics.” Most literature on celebrity politics
focuses on the various roles that the “celebrity” can take in the
political sphere. Street (2004) in his typology of celebrity
politicians describes celebrity politics as either the practice
where a person whose background is entertainment, show
business or sports trades on his background to get elected e.g.
Arnold Schwarzenegger, or a practice where a politician uses
the “forms and associations of the celebrity to enhance their
image and communicate their message” (p. 437). These two
practices are construed to comprise celebrity politics. Marsh, ‘t
Hart, and Tindall (2010) adopt a similar but broader typology of
celebrity politics to encompass the roles of celebrity advocate,
11. celebrity endorser, celebrity politician, politician celebrity, and
politician who uses other’s celebrity.
The sources of influence for celebrities
Literature on celebrity politics examines the role of
celebrities in politics by first characterizing the context from
which the celebrities derive their influence. According to Ribke
(2015), celebrity power is superficial and it derives from the
public image of the celebrities. This public image, according to
Ribke (2015) is a prefabricated one, forged by PR agents and
talent agents, who shape the celebrity as a commodity
depending on what the audience wants to see in the celebrities.
In an alternative description of celebrity power, Lindenberg,
Joly, and Stapel (2011) theorize that the influence of the
celebrities derives from their ability to influence behavior by
“activating bundles of social norms,” and that they can only do
this if they have prestige. This “prestige,” according to
Lindenberg, Joly, and Stapel (2011), only exists for as long as
the public considers the celebrities to be successful. This
characterization of prestige affirms the view by Ribke (2015)
that the public image of the celebrities is the source of their
influence. For political influence, Lindenberg, Joly, and Stapel
(2011) are of the view that the celebrities reinforce the views
that people already own by taking advantage of the
psychological connections with their audiences to endorse what
they consider ought to be.
Effect of celebrity politics on the political discourse
Scholars of celebrity politics differ in what they consider to be
the effect of celebrity politics on the political discourse. On one
side, there are those that posit that celebrities enrich or enhance
the political discourse. For instance, according to Austin, Vord,
Pinkleton, and Epstein (2008), the endorsement of political
candidates by celebrities are positively related to the political
engagement of the younger citizenry. This suggests that
celebrity politics enhances the political discourse by facilitating
12. the engagement of individuals who would otherwise be left out.
In agreement, Wheeler (2013) argues that celebrities invigorate
democracy with new ideas. According to Wheeler (2013), the
celebrities represent a new form of political agency, and their
utility in the reconfiguration of the discourse surrounding
economic, political and social change cannot be underestimated.
On the other hand, some scholars believe that celebrity politics
is detrimental to the political discourse. For instance, according
to Nolan and Brookes (2013), celebrity politics is largely
superficial in that “offers only a temporary intensity of feeling
that ultimately is empty and devoid of meaning” (p. 374). This
argument suggests that the fact that the celebrities take
advantage of their fame to influence the electorate eliminates
substance from the political discourse. Another similar
argument is that the celebrities do not have the requisite
qualifications and political experience to engage in political
discourse. According to Street (2004), the celebrities have
“irrelevant qualities and superficial knowledge that does not
justify their claim to ‘represent’” (p. 439). Finally, there is the
argument that celebrity politics drowns out the average voice in
the political discourse. Marsh, ‘t Hart, and Tindall (2010) argue
that “the focus on the policies that celebrities endorse can
devalue the social problems and unpopular, controversial or
unglamorous causes to which celebrities pay little attention” (p.
332). What this means is that celebrity politics creates an
uneven ground in politics by subjugating the average voices in
the political discourse.
Proposal 2 (Second Choice)
Topic- Obamacare: Is it time to lay ACA to rest?
Introduction
As the most popular legacy of President Barack Obama, the
Affordable Care Act (ACA) (popularly known as Obamacare)
has been a target for repealing efforts by his opponents. Most
recently, Obama’s successor, President Donald Trump,
promised his supporters during the 2016 presidential campaigns
13. that he would “repeal and replace” Obamacare. The proposed
research is a policy analysis that evaluates whether Obamacare
has been successful in achieving what it set to achieve. Given
its performance record, are the calls to repeal and replace
Obamacare justified? The preliminary thesis statement is
“Overwhelming evidence suggests that Obamacare needs radical
restructuring because while the Affordable Care Act has been
effactive in reducing the cost of healthcare, it has not
accomplished improved access and quality of care as envisaged
during its conception.” This remains a tentative thesis statement
and it is subject to change to reflect the perspectives that
emerge during the research.
Literature Review
The proposed research will examine the success, or failure, of
the Affordable Care Act in achieving its primary goals. First,
the proposed research will discuss the primary goals of the
Obamacare healthcare policy. Then, the proposed research will
evaluate the Affordable Care Act based on its performance on
each of its primary goals. There were three primary objectives
for the Affordable Care Act when it was conceived. First, ACA
was meant to increase the number of the insured people in the
United States (Manchikanti, Helm, Benyamin, & Hirsch, 2017).
The second objective of the ACA was improving the quality of
healthcare (Manchikanti et al., 2017). Finally, the third
objective of the ACA was to reduce the costs of healthcare in
the United States.
Increasing the number of insured Americans
Existing literature on the performance of the ACA suggests
that the policy has not significantly increased the number of
people covered by medical insurance in the United States. There
are differing views on the actual success of the ACA in
increasing the number of the Americans covered by medical
insurance. It would appear that Obamacare reduced the number
of uninsured Americans. According to Dalen, Waterbrook, &
Alpert (2015), more than 10 million Americans acquired
medical insurance in 2014 thanks to ACA, bringing down the
14. percentage of the uninsured Americans from 18% in July 2013
to 18% in June 2013. In agreement, Manchikanti et al. (2017)
argues that between 2010 and 2015, the percentage of uninsured
Americans reduced by 43%. However, this reduction is not
necessarily as significant as the numbers show because 13
million of the 20 million newly insured Americans were
enrolled under Medicare. According to Butler (2016), ACA
missed the projected enrollments by 10 million and it should
have been labeled as “Medicaid Expansion Act”.
Improving the quality of health care
Existing evidence-based research puts it forward that the
ACA has not improved the quality of healthcare as it set to do.
According to Manchikanti et al. (2017), while the quality of
healthcare was expected to improve on the passage of ACA, this
has not been the case due to the failure of the Act to provide
preventative services. Another aspect of health care that has not
changed is the waiting times. According to Rhodes et al (2014),
even after the passing of the ACA, elderly Medicare patients
seeking new appointments with a PCP were less successful in
obtaining appointments compared to those with private
insurance. In addition, some of the patients had to wait for over
2 weeks.
Reducing the cost of health care
Unlike the case with quality of care and the number of insured
American, research suggests that the ACA has managed to lower
the cost of healthcare in the United States in the years that it
has been in operation. According to Manchikanti et al. (2017), it
was projected that the healthcare expenditures would increase at
an average annual rate of 5.6% up to 2025 if ACA was not
passed. However, after the passage of ACA, the reform of the
health care delivery system achieved a constant out-of-pocket
spending as a percentage of the total health care spending
(Manchikanti et al., 2017). In agreement, Herrera et al. (2013)
points out that “Growth in out-of-pocket prescription spending
was effectively flat (p. 1722). According to Burger (2011), the
15. reduced costs are due to the IMR provision in the ACA, which
provides for more transparency and discourages the less
transparent mechanisms that MCOs use to charge the patients
more. Predicts that the individual mandate as well as the
accompanying minimum essential coverage provisions will
continue to significantly reduce error costs and decision costs,
to the effect of making health care in the United States even
more affordable.
Bibliography of sources
Topic 1
Austin, E. W., Vord, R. V. de, Pinkleton, B. E., & Epstein, E.
(2008). Celebrity Endorsements and Their Potential to Motivate
Young Voters. Mass Communication & Society, 11(4), 420–436.
Lindenberg, S., Joly, J., & Stapel, D. (2011). The Norm-
Activating Power of Celebrity: The Dynamics of Success and
Influence. Social Psychology Quarterly,74(1), 98-120.
Marsh, D., ‘t Hart, P., & Tindall, K. (2010). Celebrity Politics:
The Politics of the Late Modernity? Political Studies Review,
8(3), 322–340.
Nolan, D., & Brookes, S. (2013). Populism in theory and
practice: Analysing celebrity politics. Media Asia, 40(4), 373–
383.
Ribke, N. (2015). A genre approach to celebrity politics: Global
patterns of passage from media to politics. Springer.
Street, J. (2004) ‘Celebrity politicians: Popular culture and
political representation. The British Journal of Politics and
International Relations, 6(4), 435–452.
Wheeler, M. (2013). Celebrity politics: Image and identity in
contemporary political communications. Cambridge, UK :
Polity.
Topic 2
Burger, D. D. (2011). The management of health care costs:
Independent medical review after “ObamaCare.” University of
Memphis Law Review, 42(2), 255–301.
Butler, S. M. (2016). The future of the Affordable Care Act:
16. Reassessment and revision. Jama, 316(5), 495-497.
Dalen, J. E., Waterbrook, K., & Alpert, J. S. (2015). Why do so
many Americans oppose the Affordable Care Act?. The
American journal of medicine, 128(8), 807-810.
Herrera, C. N., Gaynor, M., Newman, D., Town, R. J., &
Parente, S. T. (2013). Trends underlying employer-sponsored
health insurance growth for Americans younger than age sixty-
five. Health Affairs, 32(10), 1715-1722.
Manchikanti, L., Helm, I. S., Benyamin, R. M., & Hirsch, J. A.
(2017). A Critical Analysis of Obamacare: Affordable Care or
Insurance for Many and Coverage for Few?. Pain physician,
20(3), 111.
Moncrieff, A. R., & Padi, M. (2014). Beyond payment and
delivery reform: The individual mandate’s cost-control
potential. American Journal of Law & Medicine, 40(2/3), 185–
194.
Rhodes, K. V., Kenney, G. M., Friedman, A. B., Saloner, B.,
Lawson, C. C., Chearo, D., ... & Polsky, D. (2014). Primary
care access for new patients on the eve of health care reform.
JAMA internal medicine, 174(6), 861-869.
THE RESEARCH PAPER PROCESS
Topic Selection
You will need to formally propose (as part of your written
prospectus) two political science research topics. Designate
your first and second preference. Your topic choice will in all
likelihood combine a personal interest on your part with a
relevant topic in one of the political science subfields
(American politics and government, public policy, public
administration, comparative politics, international relations,
public law, or political philosophy). A relevant topic may
overlap two or more subfields.
The criteria of “relevance” will in part be decided by your
instructor, and in part based upon your ability to convince him
17. that a relevant scholarly literature exists with regard to your
topic. The key to the successful adoption of a topic, thesis, and
overall paper will be your ability to identify a robust,
professional literature on your topic.
If you pitch a topic that is highly subjective (you have a clear
personal interest and are a true believer in your topic and the
conclusion is a done deal before you do any research) it will
likely be rejected as too biased. Your senior seminar research
paper cannot be some kind of quasi-personal political
biography. You are writing a professional political science
paper (emphasis upon science), not a personal or ideological
advocacy paper or blog, nor an interest group or political party
platform or manifesto.
Topics;
1/Trump decision to pull US troops from Syria lowers risks and
costs,
Change the words to like trump and the benefits and
disadvantages from pulling the us army from Syria
2/politics and religion.. Is politics always rational?