• Evaluate approaches to the management of IT Security
• Apply ideas from research and current practices to address problems of IT system
You have to
rch paper with a total size of 6
The research paper should contain at least the following sections. Note that you may
add sections and subsections to improve the paper and its structure; for example, you
may want to
the literature review in sub
sections, and/or you may wan
include a Background section after the Introduction.
1. An abstract where you state what you have done, what is the contribution of the
paper to the literature and what is the significance of that contribution (200
2. An introduction whe
re you state the research context/background, your research
question, the practical relevance of this question, how you will answer this question,
and how the paper is structured.
3. A critical analysis of existing literature addressing your research ques
tion. For relevant
articles analyzed, provide a summary, discuss any interesting results, insights, or
contributions, and also discuss limitations,
omissions, or technical flaws you have
identified that are important regarding your research question. Addit
ionally, you can
also review relevant practices from high quality sources, when applicable.
4. A discussion of mitigation/countermea
sures from research and/or cur
that minimize or avoid issues identified by the literature review in respect t
5. A conclusion where you draw conclusions about the research you carried out to
answer the research question. Elaborate on possibilities for future research; imagine
you have the opportunity to carry on researching the topic base
d on the knowledge you
gained and the ideas you mentioned in the discussion.
The topic and research question that will drive your research can be selected from the
list contained in the next section.
Selection of Topics and of Research Questions
following topics and research questions are all related to different aspects of IT
security management. Each research question refers to one paper as a starting point for
Enforced Security Controls/Measures
What methods and techniques can
be used to evaluate the effectiveness of different
types of security controls/measures/mechanisms enforced in organizations? (e.g., social
engineering penetration test )
What are the types of attack that challenge
ation is subject to, and
how they can be mitigated? (E.g., CAPTCHA)
What are the issues with biometric authentication, which reduce its security
effectiveness, and how they can be addressed? (E.g. typing biometric)
What methods and techniq
ues can be used by Cloud customers to control the security
of their own data in the Cloud? (E.g., Support Vector Machine technique )
What are the security and privacy challenges faced by Mobile Cloud providers , and
how they could be m
Forensics in Security Incident Response
What are the issues in the use of Digital Forensics to incident response in organizations
, and how they could be addressed?
No Plagiarism and include at least 12 quality references.