Sign In
Not register? Register Now!
Pages:
5 pages/β‰ˆ1375 words
Sources:
Check Instructions
Style:
APA
Subject:
Creative Writing
Type:
Research Proposal
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 20.25
Topic:

Cyber Research Proposal

Research Proposal Instructions:

Within INTL 647 you are required to design a line of research around an assessment of specific cyber issue. In this case, you can select the issue that you identified in your Cyber White Paper assignment (Assignment #1).
You are encouraged to refer to Belcher, Wendy Laura. 2009. "Editing Your Sentences" In Writing Your Journal Article in 12 Weeks. A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing.
The goal of this assignment is to present a clear research proposal. Your research proposal should be between 5-6 pages in length not including your preliminary source list and references.

Research Proposal Sample Content Preview:


Cyber Research Proposal
Deonte Allen
American Military University
INTL 647: Cyber Intelligence
White paper
July 5, 2021
Cyber Research Proposal
Introduction 
Statement Of The Problem 
More sophisticated DDoS attacks and improving DDoS security, mitigation, and detection strategies are necessary to secure the data, networks, servers, and systems.
The distributed denial-of-service (DDoS) is a denial-of-service (DoS) attack that disrupts the normal network traffic where many computers launch repeated attacks. The DDoS is on a larger scale than the DoS, and there are flooding techniques where there are coordinated attacks through botnets. The botnets are connected computers that are infected and simultaneously focus on a specific target. In many cases, this is done involuntarily, and even computer users may not know there are zombie computers used for denial-of-service attacks. Besides attacks through a botnet, the other way to launch DDoS attacks is through a group of hackers that provide links that allow people to collaborate in attacking websites or systems. A DDoS occurs when their attacks are from different points simultaneously, unlike the DoS attacks.
Research Question 
* The research question of this proposal is: What interventions are adequate to prevent and protects against DDoS attacks?
Background 
The denial of service attacks focus on sending and requesting a lot of data to a server on a network, and this slows down or prevents servers from working as they are unable to respond to data requests. Users can no longer access services from specific web pages as the networks and servers are overwhelmed. The DDoS attacks require coordinated efforts. Even if some services may still be available, the likelihood of severely disrupting services combined with the growing risk of ransomware is a concern.
More sophisticated DDoS attacks than ever before, and it is more challenging to protect against these types of attacks. Even when firms do not suffer financial loss, there is also reputational damage. DDoS attacks are a cause of concern, but there has been growing interest and research on methods to detect DDoS attacks(s) accurately. Improving network security is essential to protect data, information, network, and system integrity where threats are absent. To ensure there is a secure system, authorized users should be concerned about confidentiality, integrity, and availability of the assets and information.
 Purpose statement
* To evaluate strategies to prevent, protect and detect DDoS attacks.
Theoretical Framework
Cohen and Felson (1979) proposed the Routine Activities Theory (RAT) that explains there are three elements of a crime where there is a motivated offender, suitable target, or victim in an environment lacking a capable guardian to prevent the crime (Hsieh and Wang, 2018, p.335). RAT has been chiefly used to study cyber victimization and is helpful to understand the risks of cybercrime and factors that protect against cyber crimes and attacks. Different factors determine an individual or organization is vulnerable to cybercrime and attacks. The theory is predictive as it indicates where and when a crime is most likely to occur. In ad...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Proposal Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!