+1(978)310-4246 credencewriters@gmail.com
  

Th

is is an

individual

project.

The purpose of th

is

project

is to

have

you

research a

cutting

edge

or future technology related to

network

s

ecurity

.

Towson University
Final Project Instructions
This is an individual project. The purpose of this project is to have you research a cutting edge or
future technology related to network security.
Final Deliverable: An Organized Report with Bibliography
•
Your report should be 5-7 double-spaced pages in length, excluding the cover sheet and
bibliography. Your report must be typewritten, must use a 12 point font and 1″ margins.
Each page (other than the cover sheet) should include a footer with your first initial and last
name(s) left justified (e.g., M. Tavakolan), and the page number (e.g., “Page 1″) right
justified. You can choose from the project topics below. If you would like to do your research
on a specific subject which is not mentioned in the list below, please make sure to email
me and let me know. We both need to agree on your project topic if it is not in the project
topics list.
•
Your report is required to reference at least four sources upon which you based your paper.
Sources should not include marketing or advertising literature. Your sources must be
organized in a bibliography, and all references must be cited in your paper. References in
the bibliography must be prepared according to one of the standard style sheets (e.g., MLA,
APA, IEEE, ACM).
If you are unfamiliar with the format for standard bibliographic citations, please refer to the
following reference for additional information. Be sure to use complete references for
online sources. Simply referencing a website is *not* acceptable.
http://www.lib.berkeley.edu/Help/guides.html
Potential Project Topics:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Methods of protecting network infrastructure
Network security with IPsec
Security challenges of e-commerce
Security in cloud computing
Internal threats to network security in an organization
Securing electronic health records
Defending against worm and virus attacks
Firewalls
Internet of things security issues
Wireless network security
Encryption
1
Towson University
Department of Computer and Information Sciences – ITEC 451 Advanced Data Management
Term Project Fall 2020
Important Dates:
• 10/11/2020 – Project Proposals Due
• 12/08/2020 – Project Deliverable Due
Objectives:
The primary objectives of this project are to:
• Provide students with an opportunity to gain hands-on experience with a real-world data
management project.
• Allow students to practice teamwork, leadership, and project management principles.
Project Description:
Implementation Project (required for team projects)
For an implementation project, students will select a real-world data management problem and
solve it using advanced data management techniques. Topics should be based on the
technologies and techniques covered in class or emerging technologies that have not been
covered in class. Students are encouraged to select a project that fits the skills and interests of
the group. The project will require students to design and develop a database and implement
SQL queries and stored procedures for a real or fictional organization.
Research Projects (individual projects only):
For research projects, students will research an advanced database topic that is not covered in
this class and write an analytical report on the topic. Reports should include a thorough review
of the literature and should compare and contrast database technologies and techniques. The
report should be well written and citations should be inline and formatted according to a citation
standard such as IEEE, ACM, or APA. Potential topics include the following:
• Data warehousing and OLAP
• NoSQL databases
• Distributed database systems
• Database security
• Data mining and machine learning
• Cloud databases and DAAS
Delvierables:
Proposal – The project proposal should be 1 to 2 pages in length. The proposal should provide
an introduction to the proposed project and a plan for how you will execute the project. The
goal of the proposal is for you to begin to think about how you will manage the project as a team
and for me to determine whether your project scope is appropriate.
Project proposals are due on 10/11/2020 at 11:59 PM
Project Report- The final project deliverable will include the completed database implementation
that is developed in the project. Students are encouraged to develop their implementation using
virtualization technology such that the virtual machine can be provided to the professor.
Students will also be required to submit a paper that documents the project in detail. The paper
will provide an introduction to the project, project requirements, design documents (including
figures), and a description of the implementation.
Final Project Deliverables are due on 12/08/2020 at 11:59 PM.
Towson University
Final Project Instructions
This is an individual project. The purpose of this project is to have you research a cutting edge or
future technology related to network security.
Final Deliverable: An Organized Report with Bibliography
•
Your report should be 5-7 double-spaced pages in length, excluding the cover sheet and
bibliography. Your report must be typewritten, must use a 12 point font and 1” margins.
Each page (other than the cover sheet) should include a footer with your first initial and last
name(s) left justified (e.g., M. Tavakolan), and the page number (e.g., “Page 1”) right
justified. You can choose from the project topics below. If you would like to do your research
on a specific subject which is not mentioned in the list below, please make sure to email
me and let me know. We both need to agree on your project topic if it is not in the project
topics list.
•
Your report is required to reference at least four sources upon which you based your paper.
Sources should not include marketing or advertising literature. Your sources must be
organized in a bibliography, and all references must be cited in your paper. References in
the bibliography must be prepared according to one of the standard style sheets (e.g., MLA,
APA, IEEE, ACM).
If you are unfamiliar with the format for standard bibliographic citations, please refer to the
following reference for additional information. Be sure to use complete references for
online sources. Simply referencing a website is *not* acceptable.
http://www.lib.berkeley.edu/Help/guides.html
Potential Project Topics:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Methods of protecting network infrastructure
Network security with IPsec
Security challenges of e-commerce
Security in cloud computing
Internal threats to network security in an organization
Securing electronic health records
Defending against worm and virus attacks
Firewalls
Internet of things security issues
Wireless network security
Encryption
1

Purchase answer to see full
attachment

error: Content is protected !!