Saket Chapter 3

Writing

Campbellsville University

Question Description

I have attached the chapter 2 which I have written in my previous sem and now I have to create chapter 3 on the same topic as chapter 2

Use the Chapter 3 document provided and develop an outline for your Chapter 3. Write the 1st paragraph for this document where you state your objectives and the research questions that will be addressed with the Research Design in Chapter 3.

Note: you may not fully have developed Chapter 3 yet, but its important to understand what you have developed, so your instructor can assist you in areas needing guidance. Keep working on chapter 3, identifying issues, adding more research, etc., Even in weeks that do not specifically do not mention it, keep working on your chapter 3.

2 pages min.

Unformatted Attachment Preview

CHAPTER III: METHODOLOGY (note: should be 30 – 40 pages) [Begin with an introduction and restatement of the research problem and purpose. It is appropriate to repeat the problem and purpose from Chapter 1 verbatim. Conclude the introduction with a brief overview of the chapter. Restate the research question(s)/hypotheses verbatim. Research questions clearly stated and aligned with problem and purpose statements. Note: This section should be identical to wording used in Chapter 1.] Research Methods and Design(s) [Accurately describe the research method and design(s). Substantiate the appropriateness of the method and design(s); include a statement about why the method/design(s) was/were chosen over others. 1. Elaborate on the chosen research design (e.g., case study, phenomenology, comparative, correlational, quasi-experimental, etc.) appropriateness to respond to the study purpose. 2. Clearly describe the design steps. Ensure the discussion is not simply a listing and description of research designs. Provide appropriate support for the use and application of the chosen design. 3. Demonstrate why the design will accomplish the study goals and why design is the optimum choice for the research. Describe in sufficient detail so that the study could be replicated.] Population [Provide a description of the population (as appropriate), estimated size and relevant characteristics with appropriate support. Depending on the study design, populations may reflect a group of people, a set of organizations, a set of documents, archived data, etc. Describe why the population is appropriate to respond to the study problem and purpose. Clearly distinguish between the population and the sample drawn from the population.] Sample [Identify the sampling method and explain selection of participants or relevant sample, including known population characteristics and recruitment or selection strategy. Describe and justify the sampling method and minimum sample size: 1. Quantitative studies include probabilistic selection approach and a supporting power analysis for statistical significance of responses. When determining a minimum sample size, consider sampling error, representativeness and the assumptions of the proposed statistical tests. 2. Qualitative studies include references that support the proposed number of participants. Qualitative samples are typically relatively small. Refer to primary qualitative research sources to support the sampling size and method. A minimum of 15 participants is required for qualitative studies. 3. Mixed Method studies include both of the above. As appropriate: Describe how existing data were originally collected and for what purpose. Describe how participants will be selected and solicited. Access to potential participants, such as email lists from professional organizations must be described. Sampling procedures (e.g., “random”, “random stratified”, “convenience”) must be described in sufficient detail so that the process could theoretically be replicated. ] Materials/Instruments [In this section, include a description of data sources such as (a) archived data and include a description of how the data were originally collected and for what purpose along with information regarding validity and reliability; (b) published instruments (adequately describe constructs measured, coding schemes, and psychometric properties (include both indices of reliability and validity) – include as an appendix, if possible, or include sample items); (c) materials (including survey/instruments) developed for study (adequately describe the development process and final product (include as an appendix)); (d) interview protocol, including a description of how the interview questions were developed with appropriate qualitative research method support (include interview questions in an appendix); (e) apparatus (adequately describe any apparatus including model/make, how it is used, and outcome(s) it provides). A minimum of three data sources is required for the DISSERTATION. Note: The development process and tests for instrument and construct reliability and validity must be described in detail within Chapter 3 and the resulting validity/reliability measures reported in Chapter 4. Qualitative instruments should implement an expert review or pilot study of two or more experts/participants prior to data collection.] Data Collection, Processing, and Analysis [Describe the collection, processing and analyses in enough detail so that the study could be replicated. Describe the steps that will be taken to carry out the study. Provide specific details relative to the execution of the design in each appropriate section. Describe the types of data to be collected, and how the data will be coded, and what analysis process and software will be used as appropriate. Each source of data may have a different analysis process. Analysis process(es) should follow a procedure found in the literature and be cited. 1. Quantitative: Describe the analysis strategy used to test each hypothesis. The discussion must be sufficiently detailed so that the appropriateness of the statistical tests chosen is evident (i.e., the statistical tests are appropriate to respond to the research questions). 2. Qualitative: Describe how the data will be processed and analyzed (including any efforts for triangulation). Provide primary qualitative design support for the proposed analytical strategy. Explain the role of the researcher. 3. Mixed Method: include all of the above.] Note: The process should stay in sequential order based on the expected order of data collection. Detail collection of each source of data individually. Then, detail the analysis process for each source of data individually and collectively (how the individual results form a final result). Assumptions [Discuss the assumptions about the population and design along with corresponding rationale and support for the assumptions (e.g., if an adequate response rate or participant honesty are assumed, refer to the steps that will be taken to make these reasonable assumptions).] Limitations Describe the study limitations (potential weaknesses to interpretation and validity) within the context of the study design. Discuss any measures taken to mitigate limitations. Review any potential threats to validity (specific to the study design) and how they will be addressed to the extent possible. The limitations will be revisited within Chapter 5.] Delimitations Describe the study delimitations (specific choices made to narrow the scope of the study). Discuss the scope of data used in the study in this section.] Ethical Assurances [Discuss compliance with the standards for conducting research as appropriate to the proposed research design. Describe the informed consent procedures and how you will maintain confidentiality of the participants (as appropriate). Describe how raw data and documentation will be protected during and after the study. Describe how you will obtain assurances for formal approval of the study. Indicate appendixes that include additional information as needed. 1. In the proposal, state that IRB approval will be sought prior to any data collected. 2. In the final Doctoral Study Project, state that IRB approval was obtained prior to any data collection conducted]. Summary [Summarize key points presented in Chapter 3 and provide supporting citations for key points.] Note: When the proposal is approved and after the research is carried out, revise text to past tense to reflect the completed study. Revise and expand as needed to reflect how the study design was applied. For example, if parametric statistics were proposed but, upon data collection, the responses did not meet the assumptions and non-parametric tests were conducted to respond to the hypotheses, the author should describe the circumstances and rationale for the change within the Chapter 3 data analysis section. Text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text t text text text text text text text text text text text text text text text text text text text text ext text text text text text text text text text text text. Level 1: Centered, Boldface, Uppercase and Lowercase Heading Text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text. Level 2: Flush Left, Boldface, Uppercase and Lowercase Heading Text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text text. Running head: INFORMATION GOVERNANCE AND NETWORK SECURITY Information Governance in Cyber Security (Network security in information governance) Professor’s Name Student’s Name Course Date 1 INFORMATION GOVERNANCE AND NETWORK SECURITY 2 Table of Contents Introduction ................................................................................................................................................. 3 Cyber Security Threats in Networks with the need for Information governance ................................ 5 Ransomware ............................................................................................................................................ 5 Phishing.................................................................................................................................................... 6 Crypto-jacking ........................................................................................................................................ 7 Network security in information governance ........................................................................................... 9 Network Security Controls and Information Governance .................................................................... 11 Physical Network Security ................................................................................................................... 11 Technical Network Security ................................................................................................................. 11 Administrative Network Security ........................................................................................................ 12 Types of network security and information governance ....................................................................... 13 Network Access Control ....................................................................................................................... 13 Antivirus and Antimalware Software ................................................................................................. 14 Firewall Protection................................................................................................................................ 14 Network security for consumers and businesses ................................................................................ 15 Behavioral analytics .............................................................................................................................. 15 Data loss prevention.............................................................................................................................. 16 A Synergistic Relationship ....................................................................................................................... 16 Summary.................................................................................................................................................... 18 INFORMATION GOVERNANCE AND NETWORK SECURITY Chapter Two: Review of Literature Network security in information governance What I will do • I will provide a detailed introduction on cybersecurity, information governance and network security • I will do a literature survey on network security, cybersecurity and information governance. • I will providing a summary of the content in the literature survey What I will investigate • I will investigate the various types of cyber threats to the organization • I will investigate the various network security methods to curb the threats • I will investigate the types of network security and information governance Introduction Information governance is the general information policies that are significant in balancing the risks related the value of data held in an organization. Information governance helps companies governed by both legal and operational compliances in reducing the expenses that are linked to legal knowledge discoveries (Abomhara, 2015). Cybersecurity denotes the process of safeguarding the organization’s computing devices from any damage. Cybersecurity consists of the various practices, approaches and technologies that are primarily designed to secure networks and systems from unauthorized access. It comprises of all the defensive technologies and methods utilized to offer data and network protection. Also, cybersecurity 3 INFORMATION GOVERNANCE AND NETWORK SECURITY 4 techniques are crucial in enhancing data, information and network protection against various threats such as malware attacks, phishing and ransomware (Brown et al., 2015). Network security and information governance are two elements that define the integrity, confidentiality, and accessibility of data in the current information age filled with a lot of cyber threats. Therefore, information governance will dictate that the data of the customers, just like those of the company, will be protected through network security. The segmentation approach will help in ensuring that each level of users accesses their network segment. Proper network management practices will be ideal for the success of information governance. Information governance practices should consider the need for policies to help in the network's operation and management. The need for proper procedures in information and communication technology is necessary to ensure that there are minimal data loss cases and compromise. Understanding the need for network security as part of information governance is essential to successfully use and consume the ever-growing demand for information technology. This chapter seeks to exploit Network security and Information governance as a specific area of my research dissertation. The new age and era have seen an increased use of information technology in ecommerce and global connectivity, made possible by interconnections of networks. The use of networks and systems has heightened its usability at individual levels and organizations and in information transfers and storage. The increased use of information technology across the globe has attracted hackers and other online malicious groups who strive to exploit vulnerable systems. Their efforts have led to extreme actions such as bringing down the government and parastatal systems such as the national power system. Network security can be defined as the activities designed chiefly to bring about protection onto the network to enhance usability, safety, and reliability of the network infrastructure at hand. On the other hand, Information Governance (IG) INFORMATION GOVERNANCE AND NETWORK SECURITY 5 can be defined as the orchestration of processes, technology, and people to make it possible for organizations to handle their data as enterprise assets. The need for information governance and network security has, after that, surfaced and became a household activity. The company's primary duty through its network administrators and security team is to ensure that the company data and those of its customers maintain its dictates of integrity, confidentiality, and availability. For instance, the customers will trust the company with their data, such as personal emails and telephone numbers, for the case of e-commerce. As such, the company should protect them from potential attackers (Borgman et al. 2016). Therefore, information governance will dictate that the data of the customers, just like those of the company, will be protected through network security. The customers have the right to decision rights and call the company into accountability in cases where its data is compromised. Therefore, the company should deploy robust network security as part of information governance. The primary aspect is the prevention and control of threats that could penetrate or spread into and within the network (Borgman et al. 2016). The paper will hence address the issue of network security in information governance. Cyber Security Threats in Networks with the need for Information governance Ransomware: It is malicious software or malware that makes various attempts scrambling or encrypting data and participating in extortion attacks for the sole purpose of freeing the otherwise inaccessible data. Ransomware attacks are effected through the use of emails containing suspicious links. To ensure that organizations have systems against these attacks, there is a dire need for the organization to engage in frequent employee trainings with regards to opening emails on the organizational network and devices. Also, frequent antivirus INFORMATION GOVERNANCE AND NETWORK SECURITY 6 updates will go a long way in preventing these attacks. Lastly, the IT technical team must ensure the network devices within the organization are always up to date with the current and emerging security patches. Phishing: In today’s society, phishing scams are growing in prevalence. While this is happening, businesses are suffering. A phishing attack occurs when a fraudulent email or text message is sent with the purpose of collecting sensitive information (O'Leary, 2019). Since email is the primary method of communication for most businesses, it is also the most effective way for phishing attacks to occur. Worldwide there are more than 269 billion emails sent from more than 3.7 billion accounts (Binks, 2019). The ubiquitousness of email use among businesses is what makes it so successful with attackers. In 2007, it is estimated that phishing attacks cost businesses an estimated $3 billion in losses. This trend has worsened over the years as phishing attacks have become more sophisticated. In the United States, for example, it is estimated that businesses lost $2.76 million per attack (O'Leary, 2019). With phishing attacks growing in sophistication and prevalence, there is an undeniable financial cost to businesses. To help combat these attacks, it is imperative that you understand what a phishing attack looks like. Understanding this will help you develop strategies and best practices to protect yourself and your company from the financial cost of phishing attacks. These emails almost always prey on our fears and instinctual ability to panic. This is done by creating a sense of urgency. Targets of these attacks are threatened with the possibility of losing data or account details (Binks, 2019). Figure 1 illustrates how a phishing attack works. These fear tactics utilized by cybercriminals hope to create a sense of urgency within the busy business professional so ...
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!