Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Protecting the Network, Research Proposal Example
Hire a Writer for Custom Research Proposal
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
It is important to keep up with developments in network security measures. Understanding emerging paradigms about computer network security helps network professionals devise policies that enhance the integrity of the network. This research proposal is based upon protecting networks. In the course of this proposal, network vulnerabilities will be discussed, attack vectors identified, and means of defense explored
Information systems face attacks that combine numerous vulnerabilities to infiltrate networks with overwhelming force (Singhal, Anoop & Ou, Ximming, p. iv). Security of an enterprise network cannot be dogged by just counting the amount of vulnerabilities (Singhal, Anoop & Ou, Ximming, p. iv). To precisely assess the safety of such systems, its must be understood how vulnerabilities can be combined and busted to stage an attack (Singhal, Anoop & Ou, Ximming, p. iv). Vulnerabilities are modeled as probabilistic attack graphs showing paths of attacks that allow network (Singhal, Anoop & Ou, Ximming, p. iv). It is one way to measure the security of a system and maximize the security (Singhal, Anoop & Ou, Ximming, p. iv).
Game theory addresses cyber security in terms of the physical layer, network intrusion and detections, cryptography, economics of usage, and anonymity and privacy (Manshaei, Mohammad Hossein, Zhu, Quanyan, Alpcan, Tansu, Basar, Tamer and Hubaux, Jean-Pierre, p. 1). Learning games such as CyberCIEGE help teach security measures (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). Researchers are continually improving the realism behind these games in order to train networking professionals how to guard against attacks (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). Network traffic analysis capability has given users a bird’s eye view of the taxonomy involved in cyber-attacks (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). It helps them more readily identify threats, but seeing the network from the perspective of the attacker gives trainees better prospects in terms of knowing how to limit the damage caused by an attack (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). Smart grid security systems are being formulated within the system development life cycles of emerging technologies (Barnett, Bruce, Crapo, Andrew, & O’Neil, Paul, p. 1). Semantic Web Technology is capable of representing reasoning about cyber security issues to describe measure and compare both physical and network risks while prioritizing risks and threats (Barnett, Bruce, Crapo, Andrew, & O’Neil, Paul, p. 1).
This research proposal is based upon protecting networks. In the course of this proposal, network vulnerabilities will be discussed, attack vectors identified, and means of defense explored. The research question centers on what can be done to improve network security protocols? How can these emerging techniques be combined into a more robust, holistic security schema? Is there promise in combining game theory principles, emerging web technologies, and advance security GUIs?
It is important to keep up with developments in network security measures. Understanding emerging paradigms about computer network security helps network professionals devise policies that enhance the integrity of the network. The next step is to design artificially intelligent measures to defend against ever-changing risks.
Works Cited
Chang, Xuquan Stanley & Chua, Kim Yong. “A CyberCIEGE Traffic Analysis Extension for Teaching Network Security.” Naval PostGraduate School. December 2011. Thesis.
Barnett, Bruce, Crapo, Andrew, & O’Neil, Paul. “Experiences in Using Semantic Reasoners to Evaluate Security of Cyber Physical Systems.” GridSec. 2012: Print.
Manshaei, Mohammad Hossein, Zhu, Quanyan, Alpcan, Tansu, Basar, Tamer and Hubaux, Jean-Pierre. “Game Theory Meets Network Security and Privacy.” ACM Computing Surveys. December 2011. Print.
Singhal, Anoop & Ou, Ximming. “Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs.” NIST Interagency Report. August 2011. Print.
Stuck with your Research Proposal?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee