Term Paper Goal Students will conduct an in depth study of the goal of term papers and a gain deeper understanding of the topic chosen. The lectures and assignments will broaden students’ knowledge on...

1 answer below »
please check the attached paper to see what the paper look like and my part will be to write 3 pages on the solution section I have highlighted what I need in read please
Let me know if you have any question


Term Paper Goal Students will conduct an in depth study of the goal of term papers and a gain deeper understanding of the topic chosen. The lectures and assignments will broaden students’ knowledge on security, while the term papers will deepen students’ understanding of a specific topic. Topics Your topic should be related to a topic from Chapters 13-24. You should focus on emerging network security threats and/or technologies. The term paper should be motivated by an important current problem in a rather specific topic. The following table demonstrates examples of unacceptable and acceptable topics. Unacceptable Topics (Too general) Acceptable Topics (Specific current problem) Wireless Security Mobile Malware Bluetooth Security Encryption Using encryption in Cloud Systems Infrastructure Security Infrastructure Security in Smart Grids Format The paper should be written in a white paper format. Typically, a white paper advocates a certain position/problem and discusses the best way to go or that a certain solution is best for a particular problem. The paper should be written for novice readers and free of jargon. However, the paper should also inform the reader about relevant information technologies in order to help them make decisions. In general, the final term paper should consist of the following elements: Abstract (100-300 words) A good abstract should inform the reader about the paper. An abstract should include the following parts: Background: A brief description of the problem. Problem: What is the problem (topic) that the paper addresses? What is the focus of the paper? Methods: How is the problem solved? Conclusion: What are the expected results when the problem is solved? Introduction Describe the problem at hand (the central idea) in clear and precise terms. In other words, you must clearly state why this topic is important to network security. If it is possible, provide examples from current events (with citations). List specific aspects of the problem and its implications/application of the topics in For example, state the users and/or the technology systems and their relationship to the CIA triad. State your position if applicable. Academic review of previous work in the literature Provide a brief historical perspective and background Current trends in research & development Future research & development Solution Introduce possible technological, managerial, and policy solution(s). Introduce the technology with advantages and disadvantages. Make sure to include some analysis in your discussions. Your thoughts regarding current and future trends; specifically, as a team, you must state if you believe R&D is headed in the right direction. If so, you must support your position. If not, you must provide another direction and why R&D should go in that direction. Use examples to support your position. Summary or conclusion. A brief summary of the solutions to the problem. Further trends and research avenues. Bibliography in APA format (minimum of 10 academic/scholarly articles). Milestones and deliverables In each milestone, include an activity log summarizing your team activities (meetings, individual work and group work), parts of the section written by each team member, roles etc. You will complete peer evaluations after milestone 1 and 2. Note: Use double space, font size 12, Times New Roman, 1 inch margins for top, bottom, left, and right for ALL deliverables. Milestone 1 (https://psu.instructure.com/courses/2041725/assignments/11411305) Deliverables: Document that includes the following items: Identification of the topic. (A one-line statement) https://psu.instructure.com/courses/2041725/assignments/11411305 Proposed You must include at least 10 academic/scholarly articles (one will be the chapter in the book). Abstract (100-300 words). You can meet with me via Blackboard Collaborate to discuss your topic if you are interested (NOT mandatory). If you are interested, send an email with three different timeslots when you will be available to meet (as a team) with me during the week following submission of Milestone 1 to discuss our PROJECT. Milestone 2 (https://psu.instructure.com/courses/2041725/assignments/11411306) Deliverables: First draft of full paper (15 pages) Same offer to meet via Blackboard Just send an email with three different time slots when you will be available to meet (as a team). Milestone 3 (https://psu.instructure.com/courses/2041725/assignments/11411307) Deliverables: Final draft of full paper (15 pages) Outline of your presentation (completed in PowerPoint) Milestone 4 (https://psu.instructure.com/courses/2041725/assignments/11411308) Deliverable: 10 minute PowerPoint file with voice over. https://psu.instructure.com/courses/2041725/assignments/11411306 https://psu.instructure.com/courses/2041725/assignments/11411307 https://psu.instructure.com/courses/2041725/assignments/11411308
Answered Same DayMar 18, 2021

Answer To: Term Paper Goal Students will conduct an in depth study of the goal of term papers and a gain deeper...

Dilpreet answered on Mar 22 2021
144 Votes
Running Head: Information Security Controls        1
Information Security Controls        2
RISK AND IMPLEMENTATION OF INFORMATION SECURITY CONTROLS
Table of Contents
Technological Solutio
ns    3
Advantages and Disadvantages    3
Managerial Solutions    4
Policy Solutions    5
Current and Future Trends    5
References    7
Technological Solutions
    With increasing threat to the confidential data and information owned by the organizations, it is vital for the business organizations to incorporate latest technologies into its daily business operations. One such information security control can be imposed through biometric authentication. To put it in simple words, biometric authentication can be described as the process of verifying the identity of an individual through unique characteristics or measurements of their body (Ali, Monaco, Tappert & Qiu, 2017). Once the authentication is successful, the user can log on to their computer systems or any services. With advancements in technology several biometric authentication systems have come up, which use unique traits like fingerprints, palm prints, iris and retina of the individuals.
    Several biometric technologies have come up with the most common ones being fingerprint recognition and facial recognition. This technology compares biometric data captured with the already captured and stored authentic data of the individuals organized in databases. These systems work by comparing two individual sets of biometric data. The first data is the data the owner of the device already possesses and the second is that of the visitor. The two data sets must match nearly identical to each other to authenticate the identity of a person. With incorporation of such technology the organization might reduce the risk of unauthorized and unethical access to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here