Microsoft Word - H9RSC_RQ-description.docx misconduct (plagiarism and collusion). ResearchinComputing ContinuousAssessment1 (MSCCYB1-JAN21I) DrBabakHabibnia AmministrativeData...

1 answer below »

Hello, I would like to chat with the person doing my work, thank you.




Microsoft Word - H9RSC_RQ-description.docx misconduct (plagiarism and collusion). ResearchinComputing ContinuousAssessment1 (MSCCYB1-JAN21I) DrBabakHabibnia AmministrativeData ThisfirstContinuousAssessment(CA)isworth20%ofthefinalgradeawarded.As publishedintheSchoolportal,thedeadlineforsubmissionoftheassignmentis: Friday25th Jun202123:59hrs 1 1 Assignment Thisassessmentrequires thewritingofaresearchproposaldetailingaresearchquestion in the field of computing, in particular CyberSecurity. This proposal should have a brief background information of the research area, a detailed research question, the justification supporting the importance of the research question in the research area, and a list of specific items to be investigated. Thisassignmentmustincludethefollowingcomponents: • TitleChooseatitlethatencompassesthespecifictopicwithintheareachosen. • AreaIndicateinwhatareaofcybersecurityyourtopicfallsinto • ResearchQuestionPhraseyourresearchquestionaddressingthespecifictopicandthe measurableside. • Motivation/ValueExplainwhythisquestionisworthinvestigatingandhowitwill contributetoknowledgeinthefieldofcybersecurity • JustificationDescribewhythequestionisfeasible(tools),clear(measurable),significant, andethical. • ReferencesCitethekey3-5sources(journalarticles/conferencepapers/patents)youare basingyourresearchquestionon. • SpecificItemstoBeAddressedOutlineandprovideabriefexplanationofthespecific itemsthatwillbecoveredintheresearch. ThereisaspecifictemplateavailableonMoodlethatyoumustuse.Thisentire courseworkshouldbe2-3pagesinlength. 2 SubmissionInstructions TheonedeliverablemustbesubmittedviaMoodle: • ResearchQuestionReportThereportshouldbesubmittedinPDFformatonly.The reportprojectshouldbeformattedasdescribedinSection1. 3 Styleguidelines Itisdulynotedthattheassignmentshouldcomplywiththepresentationstyleofthismoduleand usetheMicrosoftWordorLATEXdocumentpreparationsystem. Thefollowingguidelinesarenotexhaustive,butshouldhelpyouwithgeneralandstylisticpoints. Eachpieceofworkmustbereferenced,withabibliographyattheend,createdusingthebuilt-in bibliographictoolavailableinMicrosoftWordorBIBTEXtoolforLATEX. ReferencesAllconcepts,figuresandotherevidence,shouldbereferencedusingthe‘Harvard’ referencingstyleasbrieflyexplainedbelow.Inthetextofyouressayyoushouldrefertothe surnameonlyoftheauthor(s),andthenthedateofpublication:e.g.,(Nolan,1983). BibliographyAttheendoftheassignment,youshouldhaveasectionmarked“Bibliography” whereallyourreferencesusedinthetextshouldbelistedinfullandalphabeticallybysurname, e.g: • Beloglazov,A.andBuyya,R.(2015).‘Openstackneat:aframeworkfordynamicand energy-efficientconsolidationofvirtualmachinesinopenstackclouds’,Concurrencyand Computation:PracticeandExperience27(5):1310–1333. • Gomes,D.G.,Calheiros,R.N.andTolosana-Calasanz,R.(2015)‘Introductiontothespecial issueoncloudcomputing:Recentdevelopmentsandchallengingissues’,Computers& ElectricalEngineering42:31–32. Additionalguidelinesonreferencingcanbeobtaineddirectlyfromthelibraryat: https://libguides.ncirl.ie/referencingandavoidingplagiarism Academicwriting TheLearningDevelopmentServiceoftheNationalCollegeofIrelandcanassistyouwithacademic writing,reading,researchingandexamtechniques. Plagiarism Donotcopyotherstudent’scourseworkirrespectiveofcohort,course,orinstitution.Thisisa disciplinaryoffence. Quotes Do not over-quote. Stringing quotes together, however good they are, is no substitute for developingyourargumentinyourownwords,withyourownemphasis.Ajudicioususeofquotes, whereitenhancesthepointyouwishtomake, isall that isneeded.Whereyoudoquote,donot quoteparagraphs;oftensinglesentences,orevenphrases, contain theessentialpointyouwant. You should never insert bits of the literature into your assignments without using this proper systemofquotationoracknowledgementasthismaybeinterpretedasplagiarismbythemarker. Nonetheless,dokeepfullquotestoaminimum.Whereyourefertoanauthor’swork,youshould stillgivethefullreference:author,date,pages,etc.,particularlyincompletemonographsorbooks. FactsAvoidassertions,vagueness,andvalue-judgements. ReviewCheckyourgrammarandspelling.Donotuseparagraphseithertooshortortoolong; eachshouldbeacoherentunit. 4 MarkingGrid Worth20%ofthefinalmark,thiscourseworkwillbegradedasfollows: 25% Title,Area,andResearchQuestion 25% Motivation/Value 25% Justification 15% SpecificItemstoBeAddressed 10% ReferencesandReportPresentation
Answered 4 days AfterJun 19, 2021

Answer To: Microsoft Word - H9RSC_RQ-description.docx misconduct (plagiarism and collusion)....

Neha answered on Jun 21 2021
149 Votes

1
Cloud Computing: Accessing Threat, Solution to security issues and Vulnerability
[Cloud Computing]
Student
Name
Student ID
MsC in Cybersecurity
National College of Ireland
Research Question
Analyze and understand different threats and the solutions for the security issues and vulnerabilities in the environment of cloud computing.
motivation/value
There are many industries like healthcare banking education, business, detail or the manufacturing which are adopting the cloud technique because it provides the efficient services and user needs to pay only for the used resources as it will help to access the network server, storage, application and the services. When the user gets circumscribed control over the data then it can create different security issues in the cloud computing like the data crash. It can also have the security issues related with the reprehensible usage of the cloud computing, misuse shared technology, account services traffic hijacking, in secure API or the multi-tenant tendency nature.
Justification
The cloud computing can be defined as the type of Internet based computing, and it is used for...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here