All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Protecting the Network, Research Proposal Example

Pages: 2

Words: 587

Research Proposal

It is important to keep up with developments in network security measures. Understanding emerging paradigms about computer network security helps network professionals devise policies that enhance the integrity of the network. This research proposal is based upon protecting networks. In the course of this proposal, network vulnerabilities will be discussed, attack vectors identified, and means of defense explored

Information systems face attacks that combine numerous vulnerabilities to infiltrate networks with overwhelming force (Singhal, Anoop & Ou, Ximming, p. iv). Security of an enterprise network cannot be dogged by just counting the amount of vulnerabilities (Singhal, Anoop & Ou, Ximming, p. iv). To precisely assess the safety of such systems, its must be understood how vulnerabilities can be combined and busted to stage an attack (Singhal, Anoop & Ou, Ximming, p. iv). Vulnerabilities are modeled as probabilistic attack graphs showing paths of attacks that allow network (Singhal, Anoop & Ou, Ximming, p. iv). It is one way to measure the security of a system and maximize the security (Singhal, Anoop & Ou, Ximming, p. iv).

Game theory addresses cyber security in terms of the physical layer, network intrusion and detections, cryptography, economics of usage, and anonymity and privacy (Manshaei, Mohammad Hossein, Zhu, Quanyan, Alpcan, Tansu, Basar, Tamer and Hubaux, Jean-Pierre, p. 1). Learning games such as CyberCIEGE help teach security measures (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). Researchers are continually improving the realism behind these games in order to train networking professionals how to guard against attacks (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). Network traffic analysis capability has given users a bird’s eye view of the taxonomy involved in cyber-attacks (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). It helps them more readily identify threats, but seeing the network from the perspective of the attacker gives trainees better prospects in terms of knowing how to limit the damage caused by an attack (Chang, Xuquan Stanley & Chua, Kim Yong, p. i). Smart grid security systems are being formulated within the system development life cycles of emerging technologies (Barnett, Bruce, Crapo, Andrew, & O’Neil, Paul, p. 1). Semantic Web Technology is capable of representing reasoning about cyber security issues to describe measure and compare both physical and network risks while prioritizing risks and threats (Barnett, Bruce, Crapo, Andrew, & O’Neil, Paul, p. 1).

This research proposal is based upon protecting networks. In the course of this proposal, network vulnerabilities will be discussed, attack vectors identified, and means of defense explored. The research question centers on what can be done to improve network security protocols? How can these emerging techniques be combined into a more robust, holistic security schema? Is there promise in combining game theory principles, emerging web technologies, and advance security GUIs?

It is important to keep up with developments in network security measures. Understanding emerging paradigms about computer network security helps network professionals devise policies that enhance the integrity of the network. The next step is to design artificially intelligent measures to defend against ever-changing risks.

Works Cited

Chang, Xuquan Stanley & Chua, Kim Yong. “A CyberCIEGE Traffic Analysis Extension for Teaching Network Security.” Naval PostGraduate School. December 2011. Thesis.

Barnett, Bruce, Crapo, Andrew, & O’Neil, Paul. “Experiences in Using Semantic Reasoners to Evaluate Security of Cyber Physical Systems.” GridSec. 2012: Print.

Manshaei, Mohammad Hossein, Zhu, Quanyan, Alpcan, Tansu, Basar, Tamer and Hubaux, Jean-Pierre. “Game Theory Meets Network Security and Privacy.” ACM Computing Surveys. December 2011. Print.

Singhal, Anoop & Ou, Ximming. “Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs.” NIST Interagency Report. August 2011. Print.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Proposal Samples & Examples

Censorship of Internet Users and Online Protestors in China, Research Proposal Example

Research Questions: How do the censorship policies of the CCP affect the general activities of Chinese citizens on social media? China is well-known for its [...]

Pages: 6

Words: 1720

Research Proposal

Electronic Cigarettes vs Commercial Cigarettes, Research Proposal Example

Abstract The goal to reduce the amount of people addicted to smoking has been a topic of concern.  The commercial market has introduced a new [...]

Pages: 9

Words: 2600

Research Proposal

Examining Student Satisfaction With Wholly Online Learning, Research Proposal Example

Various authors have since come up with significant seminal researches that seek to explore the intrigues inherent in the online education system. Allen and Seaman [...]

Pages: 5

Words: 1340

Research Proposal

The Incidence of Sexual Harassment in the Workplace, Research Proposal Example

Abstract It is imperative for small and large organizations alike to follow a code of ethical practices that dictate proper action regarding interactions both in [...]

Pages: 10

Words: 2663

Research Proposal

To What Extent Should Indigenous Entrepreneurship Be Diversified in Jamaica? Research Proposal Example

Topic To what extent should indigenous entrepreneurship be diversified in Jamaica? Context/Background Many businesses in Jamaica are owned by foreign nationals. This is an economic [...]

Pages: 4

Words: 1064

Research Proposal

How Innovation Can Help Business and Be a Factor for Growth, Research Proposal Example

This research proposal is based on the innovation of marketing products in business. The science of innovation, which is linked to the knowledge base, is [...]

Pages: 12

Words: 3382

Research Proposal

Censorship of Internet Users and Online Protestors in China, Research Proposal Example

Research Questions: How do the censorship policies of the CCP affect the general activities of Chinese citizens on social media? China is well-known for its [...]

Pages: 6

Words: 1720

Research Proposal

Electronic Cigarettes vs Commercial Cigarettes, Research Proposal Example

Abstract The goal to reduce the amount of people addicted to smoking has been a topic of concern.  The commercial market has introduced a new [...]

Pages: 9

Words: 2600

Research Proposal

Examining Student Satisfaction With Wholly Online Learning, Research Proposal Example

Various authors have since come up with significant seminal researches that seek to explore the intrigues inherent in the online education system. Allen and Seaman [...]

Pages: 5

Words: 1340

Research Proposal

The Incidence of Sexual Harassment in the Workplace, Research Proposal Example

Abstract It is imperative for small and large organizations alike to follow a code of ethical practices that dictate proper action regarding interactions both in [...]

Pages: 10

Words: 2663

Research Proposal

To What Extent Should Indigenous Entrepreneurship Be Diversified in Jamaica? Research Proposal Example

Topic To what extent should indigenous entrepreneurship be diversified in Jamaica? Context/Background Many businesses in Jamaica are owned by foreign nationals. This is an economic [...]

Pages: 4

Words: 1064

Research Proposal

How Innovation Can Help Business and Be a Factor for Growth, Research Proposal Example

This research proposal is based on the innovation of marketing products in business. The science of innovation, which is linked to the knowledge base, is [...]

Pages: 12

Words: 3382

Research Proposal