Sign In
Not register? Register Now!
You are here: HomeResearch PaperTechnology
Pages:
1 page/≈275 words
Sources:
14 Sources
Level:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 6.48
Topic:

Cyber Security: Plans, Methods, Procedures Research Paper (Research Paper Sample)

Instructions:

Write a research proposal on cyber security

source..
Content:

Research Proposal (Cyber Security)
Student Name
Student Number
RESEARCH PROPOSAL:
CYBER-SECURITY
Student Name
Instructor
Number
Date
Research Proposal
Background/introduction:
The internet and its foundation are helpless against an extensive variety of danger coming from both physical and digital dangers and perils. Modern digital on-screen characters and country states abuse vulnerabilities to take data and cash and are creating capacities to upset, pulverize, or undermine the conveyance of key administrations. A scope of customary violations is presently being executed through the internet. This incorporates the creation and appropriation of kid erotic entertainment and kid misuse schemes, keeping money and budgetary misrepresentation, licensed innovation infringement, and different violations, all of which have generous human and monetary results.
The internet is especially hard to secure because of various components: the capacity of malignant on-screen characters to work from anywhere on the planet, the linkages amongst the internet and physical frameworks, and the trouble of decreasing vulnerabilities and outcomes in complex digital systems. Of developing concern is the digital danger to basic framework, which is progressively subject to advanced digital interruptions that posture new dangers. As data innovation turns out to be progressively coordinated with physical framework operations, there is expanded danger for wide scale or high-outcome occasions that could bring about damage or disturb administrations whereupon our economy and the everyday lives of a huge number of Americans depend. In light of the danger and potential results of digital occasions, reinforcing the security and versatility of the internet has turned into a vital country security mission (Dhs.gov.in, 2016).
I have chosen this topic on The Department of Homeland Security’s role in combating the problems related to terrorism and other related threats. As this is one of the biggest concerns that The United States has been facing since the 9/11 attacks and a detailed research on the works of Homeland Security would be very intriguing and interesting as well to address the issue and the department’s role in it. There have been various questions regarding the security of the nation and I am going to address the same.
Description:
My concern is that the safety of innocent people is at stake for no reason. The terrorists attack on the weak and the innocents who have nothing to do with their problems. People need to feel safe and The Department of Homeland Security has to make sure they do because peace is what all the people in the country expect and need. The United States has seen the terror attacks back in 2001 (Purpura, 2012). It has been 15 years and they are still trying to recover from the same because the threat has been increasing since. The problem is very complex with deeper roots. In order to understand and solve the same the nation needs to dig deeper and work accordingly to make sure that terrorism is wiped away with minimum loss and focus more on the permanent solutions rather than focussing on the temporary ones.
My primary questions that I would like to undertake for the study is: What types of problems exist while combating the internet terrorism? What is the government doing to minimise the problems of cyber-security and the attacks associated with it. What are the strategies put in place by the state formed to combat the problem of cyber-security? My secondary questions that I would like to undertake for the study are what are the plans made to counter the security problems? Cyber-security is really a big problem and all the concerned persons must be brought on board to look for proper solutions. The loopholes that the criminals evade and learn the hidden security weaknesses should be completely confidential. Who is responsible for these attacks? What role does The Homeland Security play currently and how can it improvise? What dangers are involved in their methodology? The thesis statement for this research is: In order to mitigate the problems caused due to rising terrorism and related activities, the research aims to understand the strategies that may be used to diminish the existing problems and after-effects of internet terrorism activities
The expected result of my research is to get a better understanding of the work being done by Homeland Security and to highlight the areas of concern that needs to be looked upon: to combat the problems they are facing in order to reduce or wipe off the internet security threats and its effects on the country. The research is to get a better and transparent understanding on various concerns and methodologies used to counter the same. I will be going through the different variables in cyber space which affect the Department of Homeland Security has been working in order to achieve its objectives (May, Jochim, & Sapotichne, 2011). The research outcome is expected to state the motives that causes or leads.Terrorism is driven by the sheer force of aggression to fulfil someone’s personal motive or maybe a collective motive of a group of people aggrieved due to some reason whether it is relevant or not. The research is expected to provide the reasons why such activities take place and what are the roles of The department of Homeland security regarding countering the problems faced by The United States of America because this was the main reason why this organisation was formed and now it’s working to resolve the issues (Ripberger, 2011).
It is expected that the research shall show various ways to combat the problems like preventing the immediate threat, destroying the terrorist camps settled in the countries where they are formed, preventing radicalization by enhancing our efforts to stop radicalization and terrorist recruitment, build our allies’ capacity to counter terrorist threats and reassert long-term stability over their territories and many others.
The utilization of individual data has changed definitely as of late. Previously, information security was guaranteed the length of the client did not uncover data on the web. Nevertheless, in the present tech atmosphere and on online networking, clients wilfully impart data to others. This is the reason advanced protection concerns are centred around how data is utilized once it is on the web. On the off chance that a site like Facebook shares individual data without the client's assent, information security can be traded off. To take care of this issue, online suppliers and sites must manage their utilization of data and obviously show when information will be shared. At that point, the client can quit, leaving individual data kept to the space for which it was proposed
Plans, Methods and Procedures:
I intend to explore the specific problem areas that I have mentioned in my primary as well as secondary questions and the methods and strategies used by The Department of Homeland security to tackle it. Researching this topic is shall enable me to address the beneficial outcomes and welfare for the citizens. The role of The Department of Homeland Security needs to be thoroughly studied and all the methods that are going to be used shall be carefully used to get the proper result, which is the sole purpose of this research (Brattberg, 2012).
To conduct research on the same, there are two different methods namely Primary research methods and secondary research methods. For my research, secondary research method shall be employed because it gives a better understanding and the outcome is mostly accurate. To conduct this research, I shall generate information from the local state and national government websites, various academic journals, books and newspaper articles. The tools that I plan to use for conducting the research are APUS library database and Google Scholar on Homeland Security. I shall visit the APUS library database and search google on internet to gather more information on cyber-security and home based security.The journals chosen for my research shall be saved with me for future reference.
The primary research methods have many disadvantages like if one is using a large sample data then that would be time consuming. Additionally, the respondents may interpret the questions differently, which would make it difficult to compare answers. It is harder to check in primary research if the people are responding honestly or not. There is over reliance on statistical data in primary methods, which makes it lose the individual meanings, and case study data. This is the reason why I have selected the secondary research method (Vartanian, 2011).
Secondary Sources:
Bonino, S. (2012). Policing Strategies against Islamic Terrorism in the UK after 9/11: The Socio-Political Realities for British Muslims. Journal Of Muslim Minority Affairs, 32(1), 5-31. http://dx.doi.org/10.1080/13602004.2012.665619
Brattberg, E. (2012). Coordinating for Contingencies: Taking Stock of Post-9/11 Homeland Security Reforms. J Contingencies & Crisis Man, 20(2), 77-89. http://dx.doi.org/10.1111/j.1468-5973.2012.00662.x

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Research Assignment and Discuss Self-Driving Cars Paper
    Description: There are more questions with fewer answers concerning the authorization of driverless cars especially on nature of this kind of innovation...
    2 pages/≈550 words| 3 Sources | APA | Technology | Research Paper |
  • History of the Development of Inlet Diffusers Research Paper
    Description: Discuss the function and working principle of the inlet diffuser fitted in an aircraft. the paper introduces the inlet diffuser, proceeds to discuss its history...
    4 pages/≈1100 words| 4 Sources | APA | Technology | Research Paper |
  • Shallow and Deep Foundation Construction
    Description: Shallow and Deep Foundation Construction Technology Research Paper...
    10 pages/≈2750 words| 5 Sources | APA | Technology | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!