SlideShare a Scribd company logo
1 of 6
Step 1: Consider the Purpose for the Research
You have been given your assignment. It is now time to think
about the purpose of your research. You have written papers in
your classes and done some research for work projects. This
project requires that you review your previous work and
construct a basic research plan. At the graduate level, your work
will be expected to meet a higher level of cognitive objective,
using analysis, synthesis, and supporting conclusions with facts.
There are several elements in the project that your department
head will want to see to ensure that your work is on the right
track. For one, he may want to see your research question to
ensure that you are looking for the right information. If you can
develop a specific and focused research question, you will have
a good start. Next, you will look to see what information is
already out there, and if your question has already been
answered. Using a scientific approach, you will create a
working hypothesis that will present your findings and
conclusions. Remember that your ultimate objective is to arrive
at a reasonable, well-supported analysis of the impact of the
issue on your industry. This can be the first step that leads to
practical solutions for your organization’s issues.
Next, you will prepare to do your research.
Step 2: Prepare to Do Research
You already have your assignment and a purpose for your
research. In this step you will prepare for the research. For more
information, see Why Do We Do Research? on the Conducting
Research page, also in Project 2.
Another reason to do research is to answer basic questions.
While there are many times that you should research using a
traditional library and peer-reviewed journals, there will be
many questions that are answerable by targeted internet
searches. These are valid skills for you to develop and they will
serve you well in your professional life. So, get acquainted with
the Google Search tools so that you have them at your
fingertips.
To get some background on various Cybersecurity issues, read
Critical Challenges in Cybersecurity.
In the next step, you will select an issue.Step 3: Choose an
Issue
In the last step, you prepared for your research. Now it is time
to focus on an issue. Choose an issue from your research on a
trend in your industry that has potential for great impact on the
field, and then draft a preliminary question. Next, do some
preliminary reading to see if the question has already been
answered, or if there is enough information on the topic. Refine
your question and submit it to the “so what” test. Will your
answer contribute to knowledge about the issue you have
selected? Is the question answerable? Remember that in
academic work you do not normally write normative or open-
ended questions, which start with the words should or would.
In the next step, you will create a hypothesis.
Step 4: Craft a Hypothesis
You have selected an issue to research. Now it is time to craft a
working hypothesis as explained in How to Draft a Hypothesis
available on the Conducting Research page.
The next step will be the actual research.Step 5: Conduct the
Research
In the last step, you created a hypothesis. In this step, you will
begin your research.
Once you have a research question and working hypothesis, you
will conduct research to find evidence (facts) that support or
refute your hypothesis. You will then analyze the information to
produce findings and conclusions. I highly recommend that you
read Randolph Pherson's "The Five Habits of the Master
Thinker," a paper written for intelligence analysts, but
applicable to all analytical thinking and reasoning. Your
ultimate objective is to produce a well-reasoned, fact-based
analysis of your issue, and proposals to mitigate negative
conditions or improve the outlook for the industry.
You may start with the sources that you found in your top
trends assignment and dig deeper to learn more about the issue
under examination. Choose your sources wisely to find credible
sources (if appropriate for the issue). If your issue is covered in
contemporary online news sources, please use them. For more
information, review resources on Conducting Research from
Project 2.
The next step will be to put it all together in your paper. Step 6:
Write Your Paper
Now that your research is complete, you can begin to draft your
1,250- to 1,500-word paper, ensuring it is as error-free as
possible. Include a cover sheet, introduction, findings,
conclusions with recommendations, and references.
Suggested Resources:
Kinds of Assignments You Will Write
References and Citations
Next, you will submit your paper.
Annotated Bibliography: Trends in Cyber Security
By
17 October 2016
For my project I am going to discuss cyber security trends.
It always has intrigued me about how network managers adapt
to changes in technology. The cyber security field constantly
challenges the workers to grow and learn new things. I am
excited to research network penetration, cyber investigations,
and assessing overall network security for different
organizations.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the
global penetration of Sony Corp.'s rootkit installations on
computers. By using the Domain Name System (DNS), he was
able to trace connections to a Sony Web site and estimate the
extent to which personal computers had been infected by the
Sony rootkit installation, which sent information to Sony about
computer users' music copying and also made it difficult for
purchasers of Sony Music to copy their music to iTunes or other
music players.
Metasploit Penetration Testing Cookbook. (2013). Network
Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9
Metasploit is a favorite tool of people wearing white hats, black
hats and every shade in between. As a penetration testing tool,
it is immensely powerful (sometimes dangerously so). And the
same goes for its use as aa hacking tool. This is a very
interesting article showing how powerful tools can be used for
both good and bad.
Sández, M. R. (2015). A Review of Technical Problems when
Conducting an Investigation in Cloud Based Environments.
This article shines the light on how difficult it is to maintain
security and adopt new technologies. It explains how cloud base
computing has done wonders for businesses by making
resources easier to access and cheaper. It also divulges how
criminals can steal data from clouds and also hide nefarious
data in other peoples’ cloud storage.
Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015).
Towards the Forensic Identification and Investigation of
Cloud Hosted Servers through Noninvasive Wiretaps.
doi:10.1109/ARES.2015.77
This article actually gets into the nuts in bolts of conducting a
cyber investigation in a cloud environment. It discusses one of
the big challenges as conducting an investigation when you
might not have the cooperation of the people who own the
server.
Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R.
(2015). Network security and performance testing for health
information system management.
This article discusses the unique challenges that a hospital
presents fornetwork security. One of the main focuses is on
encryption (hospital traffic needs to be secure as it as patient
data in it).
Dixit, S. (2016). Holding the fort: a business case for testing
security. Network Security, 2016(6), 16-18.
doi:10.1016/S1353-4858(16)30059-9
This article talks about what to do when the costs of data
breaches keep skyrocketing year after year. An interesting note
is what can you do when the companies you hire keep being
breached.
Step 1 Consider the Purpose for the ResearchYou have been given.docx

More Related Content

Similar to Step 1 Consider the Purpose for the ResearchYou have been given.docx

Data management plans
Data management plansData management plans
Data management plans
Brad Houston
 
Reading 1 need assessment
Reading 1 need assessmentReading 1 need assessment
Reading 1 need assessment
Alex Tsang
 
Introduction research methodology
Introduction research methodologyIntroduction research methodology
Introduction research methodology
USV Ltd
 
Introduction Research methodology
Introduction Research methodology Introduction Research methodology
Introduction Research methodology
panaidu
 
Saylor URL httpwww.saylor.orgbooks Saylor.org 402 .docx
Saylor URL httpwww.saylor.orgbooks  Saylor.org   402 .docxSaylor URL httpwww.saylor.orgbooks  Saylor.org   402 .docx
Saylor URL httpwww.saylor.orgbooks Saylor.org 402 .docx
kenjordan97598
 

Similar to Step 1 Consider the Purpose for the ResearchYou have been given.docx (20)

Cbr 600 Believe Possibilities / snaptutorial.com
Cbr 600  Believe Possibilities / snaptutorial.comCbr 600  Believe Possibilities / snaptutorial.com
Cbr 600 Believe Possibilities / snaptutorial.com
 
Cbr 600 Extraordinary Success/newtonhelp.com
Cbr 600 Extraordinary Success/newtonhelp.com  Cbr 600 Extraordinary Success/newtonhelp.com
Cbr 600 Extraordinary Success/newtonhelp.com
 
CBR 600 Effective Communication - snaptutorial.com
CBR 600 Effective Communication - snaptutorial.comCBR 600 Effective Communication - snaptutorial.com
CBR 600 Effective Communication - snaptutorial.com
 
Cbr 600Education Specialist / snaptutorial.com
Cbr 600Education Specialist / snaptutorial.comCbr 600Education Specialist / snaptutorial.com
Cbr 600Education Specialist / snaptutorial.com
 
CBR 600 RANK Remember Education--cbr600rank.com
CBR 600 RANK Remember Education--cbr600rank.comCBR 600 RANK Remember Education--cbr600rank.com
CBR 600 RANK Remember Education--cbr600rank.com
 
CBR 600 RANK Inspiring Innovation--cbr600rank.com
CBR 600 RANK Inspiring Innovation--cbr600rank.comCBR 600 RANK Inspiring Innovation--cbr600rank.com
CBR 600 RANK Inspiring Innovation--cbr600rank.com
 
CBR 600 RANK Become Exceptional--cbr600rank.com
CBR 600 RANK Become Exceptional--cbr600rank.comCBR 600 RANK Become Exceptional--cbr600rank.com
CBR 600 RANK Become Exceptional--cbr600rank.com
 
CBR 600 RANK Introduction Education--cbr600rank.com
CBR 600 RANK Introduction Education--cbr600rank.comCBR 600 RANK Introduction Education--cbr600rank.com
CBR 600 RANK Introduction Education--cbr600rank.com
 
Answer Direct Interview
Answer    Direct InterviewAnswer    Direct Interview
Answer Direct Interview
 
Final Module 2 WBS 3630 24.11.16
Final Module 2 WBS 3630 24.11.16Final Module 2 WBS 3630 24.11.16
Final Module 2 WBS 3630 24.11.16
 
Data management plans
Data management plansData management plans
Data management plans
 
Reading 1 need assessment
Reading 1 need assessmentReading 1 need assessment
Reading 1 need assessment
 
Modules module5mod5home.htmlmodule 5 homecomparing models
Modules module5mod5home.htmlmodule 5   homecomparing modelsModules module5mod5home.htmlmodule 5   homecomparing models
Modules module5mod5home.htmlmodule 5 homecomparing models
 
1. introduction to data science —
1. introduction to data science —1. introduction to data science —
1. introduction to data science —
 
CBR 600 Imagine Your Future/newtonhelp.com   
CBR 600 Imagine Your Future/newtonhelp.com   CBR 600 Imagine Your Future/newtonhelp.com   
CBR 600 Imagine Your Future/newtonhelp.com   
 
CBR 600 Life of the Mind/newtonhelp.com   
CBR 600 Life of the Mind/newtonhelp.com   CBR 600 Life of the Mind/newtonhelp.com   
CBR 600 Life of the Mind/newtonhelp.com   
 
Introduction research methodology
Introduction research methodologyIntroduction research methodology
Introduction research methodology
 
Introduction Research methodology
Introduction Research methodology Introduction Research methodology
Introduction Research methodology
 
Saylor URL httpwww.saylor.orgbooks Saylor.org 402 .docx
Saylor URL httpwww.saylor.orgbooks  Saylor.org   402 .docxSaylor URL httpwww.saylor.orgbooks  Saylor.org   402 .docx
Saylor URL httpwww.saylor.orgbooks Saylor.org 402 .docx
 
Cbr 600 Enhance teaching / snaptutorial.com
Cbr 600    Enhance teaching / snaptutorial.comCbr 600    Enhance teaching / snaptutorial.com
Cbr 600 Enhance teaching / snaptutorial.com
 

More from whitneyleman54422

In this task, you will write an analysis (suggested length of 3–5 .docx
In this task, you will write an analysis (suggested length of 3–5 .docxIn this task, you will write an analysis (suggested length of 3–5 .docx
In this task, you will write an analysis (suggested length of 3–5 .docx
whitneyleman54422
 
In this SLP you will identify where the major transportation modes a.docx
In this SLP you will identify where the major transportation modes a.docxIn this SLP you will identify where the major transportation modes a.docx
In this SLP you will identify where the major transportation modes a.docx
whitneyleman54422
 
In this module the student will present writing which focuses attent.docx
In this module the student will present writing which focuses attent.docxIn this module the student will present writing which focuses attent.docx
In this module the student will present writing which focuses attent.docx
whitneyleman54422
 
In this essay you should combine your practice responding and analyz.docx
In this essay you should combine your practice responding and analyz.docxIn this essay you should combine your practice responding and analyz.docx
In this essay you should combine your practice responding and analyz.docx
whitneyleman54422
 
In this Discussion, pick one film to write about and answer ques.docx
In this Discussion, pick one film to write about and answer ques.docxIn this Discussion, pick one film to write about and answer ques.docx
In this Discussion, pick one film to write about and answer ques.docx
whitneyleman54422
 
In this assignment, you will identify and interview a family who.docx
In this assignment, you will identify and interview a family who.docxIn this assignment, you will identify and interview a family who.docx
In this assignment, you will identify and interview a family who.docx
whitneyleman54422
 
In this assignment, I want you to locate two pieces of news detailin.docx
In this assignment, I want you to locate two pieces of news detailin.docxIn this assignment, I want you to locate two pieces of news detailin.docx
In this assignment, I want you to locate two pieces of news detailin.docx
whitneyleman54422
 
In the provided scenario there are a few different crimes being .docx
In the provided scenario there are a few different crimes being .docxIn the provided scenario there are a few different crimes being .docx
In the provided scenario there are a few different crimes being .docx
whitneyleman54422
 
STOP THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docx
STOP  THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docxSTOP  THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docx
STOP THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docx
whitneyleman54422
 
Stoichiometry Lab – The Chemistry Behind Carbonates reacting with .docx
Stoichiometry Lab – The Chemistry Behind Carbonates reacting with .docxStoichiometry Lab – The Chemistry Behind Carbonates reacting with .docx
Stoichiometry Lab – The Chemistry Behind Carbonates reacting with .docx
whitneyleman54422
 
Stock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docx
Stock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docxStock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docx
Stock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docx
whitneyleman54422
 

More from whitneyleman54422 (20)

In this unit, you will experience the powerful impact communication .docx
In this unit, you will experience the powerful impact communication .docxIn this unit, you will experience the powerful impact communication .docx
In this unit, you will experience the powerful impact communication .docx
 
In this task, you will write an analysis (suggested length of 3–5 .docx
In this task, you will write an analysis (suggested length of 3–5 .docxIn this task, you will write an analysis (suggested length of 3–5 .docx
In this task, you will write an analysis (suggested length of 3–5 .docx
 
In this SLP you will identify where the major transportation modes a.docx
In this SLP you will identify where the major transportation modes a.docxIn this SLP you will identify where the major transportation modes a.docx
In this SLP you will identify where the major transportation modes a.docx
 
In this module the student will present writing which focuses attent.docx
In this module the student will present writing which focuses attent.docxIn this module the student will present writing which focuses attent.docx
In this module the student will present writing which focuses attent.docx
 
In this module, we looked at a variety of styles in the Renaissa.docx
In this module, we looked at a variety of styles in the Renaissa.docxIn this module, we looked at a variety of styles in the Renaissa.docx
In this module, we looked at a variety of styles in the Renaissa.docx
 
In this experiential learning experience, you will evaluate a health.docx
In this experiential learning experience, you will evaluate a health.docxIn this experiential learning experience, you will evaluate a health.docx
In this experiential learning experience, you will evaluate a health.docx
 
In this essay you should combine your practice responding and analyz.docx
In this essay you should combine your practice responding and analyz.docxIn this essay you should combine your practice responding and analyz.docx
In this essay you should combine your practice responding and analyz.docx
 
In this Discussion, pick one film to write about and answer ques.docx
In this Discussion, pick one film to write about and answer ques.docxIn this Discussion, pick one film to write about and answer ques.docx
In this Discussion, pick one film to write about and answer ques.docx
 
In this assignment, you will identify and interview a family who.docx
In this assignment, you will identify and interview a family who.docxIn this assignment, you will identify and interview a family who.docx
In this assignment, you will identify and interview a family who.docx
 
In this assignment, you will assess the impact of health legisla.docx
In this assignment, you will assess the impact of health legisla.docxIn this assignment, you will assess the impact of health legisla.docx
In this assignment, you will assess the impact of health legisla.docx
 
In this assignment, you will create a presentation. Select a topic o.docx
In this assignment, you will create a presentation. Select a topic o.docxIn this assignment, you will create a presentation. Select a topic o.docx
In this assignment, you will create a presentation. Select a topic o.docx
 
In this assignment, the student will understand the growth and devel.docx
In this assignment, the student will understand the growth and devel.docxIn this assignment, the student will understand the growth and devel.docx
In this assignment, the student will understand the growth and devel.docx
 
In this assignment, I want you to locate two pieces of news detailin.docx
In this assignment, I want you to locate two pieces of news detailin.docxIn this assignment, I want you to locate two pieces of news detailin.docx
In this assignment, I want you to locate two pieces of news detailin.docx
 
In this assignment worth 150 points, you will consider the present-d.docx
In this assignment worth 150 points, you will consider the present-d.docxIn this assignment worth 150 points, you will consider the present-d.docx
In this assignment worth 150 points, you will consider the present-d.docx
 
In the readings thus far, the text identified many early American in.docx
In the readings thus far, the text identified many early American in.docxIn the readings thus far, the text identified many early American in.docx
In the readings thus far, the text identified many early American in.docx
 
In the Roman Colony, leaders, or members of the court, were to be.docx
In the Roman Colony, leaders, or members of the court, were to be.docxIn the Roman Colony, leaders, or members of the court, were to be.docx
In the Roman Colony, leaders, or members of the court, were to be.docx
 
In the provided scenario there are a few different crimes being .docx
In the provided scenario there are a few different crimes being .docxIn the provided scenario there are a few different crimes being .docx
In the provided scenario there are a few different crimes being .docx
 
STOP THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docx
STOP  THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docxSTOP  THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docx
STOP THE MEETING MADNESS HOW TO FREE UP TIME FOR ME.docx
 
Stoichiometry Lab – The Chemistry Behind Carbonates reacting with .docx
Stoichiometry Lab – The Chemistry Behind Carbonates reacting with .docxStoichiometry Lab – The Chemistry Behind Carbonates reacting with .docx
Stoichiometry Lab – The Chemistry Behind Carbonates reacting with .docx
 
Stock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docx
Stock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docxStock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docx
Stock-Trak Portfolio Report Write-Up GuidelinesYou may want to.docx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Step 1 Consider the Purpose for the ResearchYou have been given.docx

  • 1. Step 1: Consider the Purpose for the Research You have been given your assignment. It is now time to think about the purpose of your research. You have written papers in your classes and done some research for work projects. This project requires that you review your previous work and construct a basic research plan. At the graduate level, your work will be expected to meet a higher level of cognitive objective, using analysis, synthesis, and supporting conclusions with facts. There are several elements in the project that your department head will want to see to ensure that your work is on the right track. For one, he may want to see your research question to ensure that you are looking for the right information. If you can develop a specific and focused research question, you will have a good start. Next, you will look to see what information is already out there, and if your question has already been answered. Using a scientific approach, you will create a working hypothesis that will present your findings and conclusions. Remember that your ultimate objective is to arrive at a reasonable, well-supported analysis of the impact of the issue on your industry. This can be the first step that leads to practical solutions for your organization’s issues. Next, you will prepare to do your research. Step 2: Prepare to Do Research You already have your assignment and a purpose for your research. In this step you will prepare for the research. For more information, see Why Do We Do Research? on the Conducting Research page, also in Project 2. Another reason to do research is to answer basic questions. While there are many times that you should research using a traditional library and peer-reviewed journals, there will be many questions that are answerable by targeted internet searches. These are valid skills for you to develop and they will serve you well in your professional life. So, get acquainted with
  • 2. the Google Search tools so that you have them at your fingertips. To get some background on various Cybersecurity issues, read Critical Challenges in Cybersecurity. In the next step, you will select an issue.Step 3: Choose an Issue In the last step, you prepared for your research. Now it is time to focus on an issue. Choose an issue from your research on a trend in your industry that has potential for great impact on the field, and then draft a preliminary question. Next, do some preliminary reading to see if the question has already been answered, or if there is enough information on the topic. Refine your question and submit it to the “so what” test. Will your answer contribute to knowledge about the issue you have selected? Is the question answerable? Remember that in academic work you do not normally write normative or open- ended questions, which start with the words should or would. In the next step, you will create a hypothesis. Step 4: Craft a Hypothesis You have selected an issue to research. Now it is time to craft a working hypothesis as explained in How to Draft a Hypothesis available on the Conducting Research page. The next step will be the actual research.Step 5: Conduct the Research In the last step, you created a hypothesis. In this step, you will begin your research. Once you have a research question and working hypothesis, you will conduct research to find evidence (facts) that support or refute your hypothesis. You will then analyze the information to produce findings and conclusions. I highly recommend that you read Randolph Pherson's "The Five Habits of the Master Thinker," a paper written for intelligence analysts, but applicable to all analytical thinking and reasoning. Your ultimate objective is to produce a well-reasoned, fact-based analysis of your issue, and proposals to mitigate negative conditions or improve the outlook for the industry.
  • 3. You may start with the sources that you found in your top trends assignment and dig deeper to learn more about the issue under examination. Choose your sources wisely to find credible sources (if appropriate for the issue). If your issue is covered in contemporary online news sources, please use them. For more information, review resources on Conducting Research from Project 2. The next step will be to put it all together in your paper. Step 6: Write Your Paper Now that your research is complete, you can begin to draft your 1,250- to 1,500-word paper, ensuring it is as error-free as possible. Include a cover sheet, introduction, findings, conclusions with recommendations, and references. Suggested Resources: Kinds of Assignments You Will Write References and Citations Next, you will submit your paper. Annotated Bibliography: Trends in Cyber Security By 17 October 2016
  • 4. For my project I am going to discuss cyber security trends. It always has intrigued me about how network managers adapt to changes in technology. The cyber security field constantly challenges the workers to grow and learn new things. I am excited to research network penetration, cyber investigations, and assessing overall network security for different organizations. References Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM. Communications Of The ACM, 49(6), 62-68. The author describes a technique he employed to determine the global penetration of Sony Corp.'s rootkit installations on computers. By using the Domain Name System (DNS), he was able to trace connections to a Sony Web site and estimate the extent to which personal computers had been infected by the Sony rootkit installation, which sent information to Sony about computer users' music copying and also made it difficult for purchasers of Sony Music to copy their music to iTunes or other music players. Metasploit Penetration Testing Cookbook. (2013). Network Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9 Metasploit is a favorite tool of people wearing white hats, black hats and every shade in between. As a penetration testing tool, it is immensely powerful (sometimes dangerously so). And the
  • 5. same goes for its use as aa hacking tool. This is a very interesting article showing how powerful tools can be used for both good and bad. Sández, M. R. (2015). A Review of Technical Problems when Conducting an Investigation in Cloud Based Environments. This article shines the light on how difficult it is to maintain security and adopt new technologies. It explains how cloud base computing has done wonders for businesses by making resources easier to access and cheaper. It also divulges how criminals can steal data from clouds and also hide nefarious data in other peoples’ cloud storage. Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015). Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps. doi:10.1109/ARES.2015.77 This article actually gets into the nuts in bolts of conducting a cyber investigation in a cloud environment. It discusses one of the big challenges as conducting an investigation when you might not have the cooperation of the people who own the server. Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R. (2015). Network security and performance testing for health information system management. This article discusses the unique challenges that a hospital presents fornetwork security. One of the main focuses is on encryption (hospital traffic needs to be secure as it as patient data in it). Dixit, S. (2016). Holding the fort: a business case for testing security. Network Security, 2016(6), 16-18. doi:10.1016/S1353-4858(16)30059-9 This article talks about what to do when the costs of data breaches keep skyrocketing year after year. An interesting note is what can you do when the companies you hire keep being breached.