Question Details

Answered: - Need a paper describing the results of an analytical research


Need a paper describing the results of an analytical research project. Should be 10-12 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end.

Paper Topic:

I would like to complete my research paper on Cisco IOS Intrusion Prevention System (IPS).

I will write a brief synapsis of what functions a good IPS solution should include based on the NIST guidelines. Then I will research how the CISCO IOS IPS rates against those guidelines and where it may be lacking and how those lacking characteristics could lead to vulnerabilities being exploited.




Summary

 

This is a paper describing the results of an analytical research project, worth 25% of your total

 

grade. Your paper should be 10-12 pages, double-spaced, exclusive of cover, title page, table of

 

contents, endnotes and bibliography. Your paper must use APA formatting with the exception that

 

tables and figures can be inserted at the appropriate location rather than added at the end.

 

Following UMUC policy, all students must upload their papers to Turnitin.com (following

 

instructions provided by your instructor), produce and review an originality report, and submit

 

the final version of the paper to your Assignment Folder prior to the submission deadline.

 

Paper Topic Selection

 

Prior to writing your paper, you must submit a short, ungraded, topic proposal. You should

 

submit your intended research paper topic by the end of Session 3. The purpose of this

 

preliminary milestone is to provide your instructor the opportunity to confirm the

 

appropriateness of your proposed topic, sufficiently early in the course to allow for topic revision

 

if necessary. It will be helpful if you include, with your proposed paper topic, the sort of research

 

you intend to do and any specific sources you may have already found or plan to use in

 

researching your topic. Your instructor will provide feedback on the suitability of the proposed

 

topic by the start of Session 5. Students who do not provide a proposed topic will be preparing

 

their research papers "at risk;" i.e., they will run the risk of delivering a paper reflecting research

 

that is not suitable for this course.

 

Analytical Research Project

 

The purpose of the Research Project is to develop an in-depth understanding of the intrusion

 

detection and/or prevention technology and the way in which such technology is used to protect

 

specific computing environments against specific threats. To arrive at this understanding, your

 

project may choose to follow either one of two analytical approaches:

 

1. Analysis of a tool or technique including functional applicability and limitations

 

2. Analysis of environmental security requirements and technologies to meet those

 

requirements

 

Tool-centric Research: Projects of the first type will focus on a specific tool, technique, or

 

method used in intrusion detection or intrusion prevention. Choosing a topic for this type of

 

project will mean selecting the tool you want to research and analyze and developing a research

 

question or thesis statement that your research is intended to answer. The analysis for a toolcentric research project should emphasize the use and application of the tool, technique, or

 

method rather than a simple explanation of its features. If you choose a product or tool with a

 

broad set of capabilities, you may choose to provide an analysis of one or more aspects of the

 

tool. The paper distills fundamental issues, focuses on one available solution, and provides a

 

detailed analysis of both the functional applicability and the limitations of the available

 

solution. In other words, you should explain in your paper the functional purposes and/or

 

security goals the chosen tool is well-suited to address, and also things for which it is not a good

 


 

1

 


 

choice. You are welcome to choose any type of IDS tool, including network-based, host-based,

 

or wireless products.

 

Environment-centric Research: The second type of project also looks at intrusion detection and

 

prevention technologies, but adopts an organizational perspective by first defining and analyzing

 

an operating environment, and then identifying and recommending appropriate IDS/IPS

 

technologies. Choosing a topic for this type of project will mean describing a specific computing

 

environment and any operational needs for safeguarding that environment. The analysis for an

 

environment-centric research project should emphasize the threats faced by the organization and

 

assess IDS/IPS technologies in the context of providing protection from those threats. This type

 

of research project mimics the process many real-world organizations go through when selecting

 

IDS/IPS tools (or other types of technologies), in which organizations first specify requirements

 

and then evaluate alternatives to see what technologies best meet their requirements. You may

 

choose to focus on a specific organization (like a company or agency) or on a class of

 

organization (e.g., based on relative size, industry, business model, etc.). It is important that you

 

be able to specify security requirements for the organization or operating environment that you

 

choose for your project.

 

Regardless of which type of project you choose, your paper must demonstrate graduate-level

 

writing ability and comply with the format requirements of the Publications Manual of the

 

American Psychological Association (6th edition). Careful attention should be given to source

 

citations, proper listing of references, and the presentation of tables and graphs. Be sure to

 

carefully cite (using correct APA-Style in-line citations) all sources of information in your paper.

 

An adequate literature search will include 3-5 books and/or journal articles (or other scholarly

 

sources), such as those available through the UMUC Online Library. For the topics anticipated

 

for this paper a search of Internet sources is also expected to be helpful and appropriate.

 


 

2

 


 

 


Solution details:
STATUS
Answered
QUALITY
Approved
ANSWER RATING

This question was answered on: Oct 07, 2020

PRICE: $15

Solution~0002228483.zip (25.37 KB)

Buy this answer for only: $15

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
SiteLock

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Oct 07, 2020

EXPERT

Tutor

ANSWER RATING

GET INSTANT HELP/h4>

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

NEW ASSIGNMENT HELP?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN YOUR SET DEADLINE.

Order Now