The Challenge of Implementing Zero Trust Model for the Network Security
Project2 You should be submitted in Backboard CTEC402 Project2: Due Date: See the Backboard Description: You are required work as individually, however if you selected work with your group member it is okay. If it doesn’t work out with your team member you are responsible to complete the project individually. You should work on this project outside of the class time. This is Project it has a maximum of 20 points. The maximum plagiarism allowed is 10%. Anything more than that I will deduct points for each additional percent of plagiarism. You must utilize this format for the Project: Topic: The Challenge of Implementing Zero Trust Model for the Network Security Project2 Submitted By: Your Name BOWIE STATE UNIVERSITY Software & Operating Systems Security CTEC402-101 Spring 2023 Project2 You should be submitted in Backboard CTEC402 Project2: Due Date: See the Backboard The Research Project format definition Introduction — Define the issue and provide background discussion while building credibility. Find common ground with your audience and hook them in. Problem Definition — Don’t start selling yet. Thoroughly and completely identify the business problem your technology solves. This section should be entirely from the perspective of the target audience. Definition of Research Purpose –The research purpose is a statement of “why” the study is being conducted, or the goal of the study. The goal of a study might be to identify or describe a concept or to explain or predict a situation or solution to a situation that indicates the type of study to be conducted. Methods Solution — Describe relevant technologies at a high level, including any competing technologies (which you will rebut later). Support your arguments with tables, charts, and graphics. Quote industry experts as needed to bolster your positions. You are educating your target audience on the current state of the art, as well as where your solution fits. Research methodology — is the specific procedures or techniques used to identify, select, process, and analyze information about a topic. In a research paper, the methodology section allows the reader to critically evaluate a study’s overall validity and reliability. The methodology section answers two main questions: How was the data collected or generated? How was it analyzed? Research questions The process of developing your research question follows several steps: Choose a broad topic • Do some preliminary reading to find out about topical debates and issues • Narrow down a specific niche that you want to focus on • Identify a practical or theoretical research problem that you will address When you have a clearly-defined problem, you need to formulate more questions. Think about exactly what you want to know and how it will contribute to resolving the problem Case studies usually follow a typical story structure, which means they have a beginning, middle, and end. Think of them as a “before and after” snapshot of a customer’s business – complete with quotes, statistics, and images. Example: Baltimore transfers $6 million to pay for ransomware attack; city considers insurance against hacks: https://www.baltimoresun.com/politics/bs-md-ci-ransomware-expenses20190828njgznd7dsfaxbbaglnvnbkgjhe-story.html Project2 You should be submitted in Backboard CTEC402 Project2: Due Date: See the Backboard Summary — A research summary is a type of paper designed to provide a brief overview of a given study – typically, an article from a peer-reviewed academic journal. Your Project MUST contain following format: 1. Introduction (2 points) (minimum two paragraph with 255 characters and with single space) 2. Problem Statement (2 points) (minimum one paragraph with 255 characters and with single space) 3. Research Questions (2 points) (minimum 10 questions) 4. Purpose of the Research (1 points) (minimum one paragraph with 255 characters and with single space) 5. Case Study (2 points) (minimum two paragraph with 255 characters and with single space) 6. Methodologies (8 points) (1 pt. each) ( each method minimum one paragraph with 255 characters and with single space) 1. Method – From the article 1 2. Method – From the article 2 3. Method – From the article 3 4. Method – From the article 4 5. Method – On your own, test the method using software/tools, and explain the results. 6. Method – On your own, test the method using software/tools, and explain the results. 7. Method – On your own, test the method using software/tools, and explain the results. 8. Method – On your own, test the method using software/tools, and explain the results. 7. Summary (2 points) (minimum one paragraph with 255 characters and with single space) 8. References (1 points) (minimum 10 different with references APA style format) https://www.mendeley.com/guides/apa-citation-guide Project Requirement You must complete all 8 sections of this Project, in an organized, well-written report. NOTE: You need to have 8 methodologies, each one coming from one of the ten articles that you read. You must explain each article in the literature review section and then explain the methodology itself in the methodologies section. Include the description of the methodology and any experiments, results, etc. Sample Video What is Artificial Intelligence? https://www.youtube.com/watch?v=2ePf9rue1Ao Project2 You should be submitted in Backboard CTEC402 Project2: Due Date: See the Backboard Artificial intelligence in cybersecurity https://www.youtube.com/watch?v=GJMevKox_Q8 Artificial Intelligence | Cyber Security Crash Course https://www.youtube.com/watch?v=F-9mSOpWHX8 Sample articles: https://itirra.com/blog/leveraging-ai-for-continuous-detection-of-zero-day-threats/ https://www.researchgate.net/profile/Ahmed_Aleroud/publication/233942490_A_Contextual_Anomaly_Detection_Ap proach_to_Discover_Zero-Day_Attacks/links/0046352a54c1f81fc0000000/A-Contextual-Anomaly-Detection-ApproachtoDiscover-Zero-Day-Attacks.pdf You need use the scholar Google to find correct articles: https://scholar.google.com/ Project Deliverables ➢ Report needs to be submitted into Blackboard by the due date ➢ Prepare a class PowerPoint Presentation and DEMO. (50% of your grade is based on successful DEMO with documentation) ➢ Prepare a 15-20 Slides PowerPoint in class to DEMO your results ➢ Record a Slideshow with Narration as a Video in PowerPoint It needs to be submitted in Blackboard by 5:00 PM on due date before the class otherwise it will not be graded. NO LATE WORK ACCEPTED. Be prepared to present it during the class. REQUIREMENTS – Any project received after the time of the class is considered late (NO EXCUSES) and is graded with 30% off for each class it is late.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.