Northern State University Computer Science Paper

User Generated

UNF88

Computer Science

Northern State University

Description

Reflecting on what you learned in this class, please describe in detail what you consider to be the most important concepts, principles, and techniques you have learned. Explain why you consider each of these important, and provide specific examples or applications from your research or other relevant sources to support your answer. The report should have at least 800 words. Include the word count at the end of the report.

Unformatted Attachment Preview

1 Plagiarism: Definition and Types, Consequences, and How to Avoid It Introduction Plagiarism is a form of academic dishonesty that has serious consequences for those who partake in it. Plagiarism can be defined as the act of taking someone else’s words or ideas and claiming them as one's own. It is considered a form of intellectual theft and is highly unethical. Plagiarism can take many forms, including direct copying, paraphrasing, self-plagiarism, and patchwriting. It is important to understand the different types of plagiarism and how to avoid them in order to produce original, ethical work. In this paper, we will discuss the definition and types of plagiarism, consequences, and how to avoid it. Additionally, methods of citation, rules for using quotations, and plagiarism detection tools will be discussed. Definition and Types of Plagiarism Plagiarism is defined as the act of using another’s words or ideas as one’s own without giving credit to the original author (Nelson-Becker & Walker, 2018). It is considered a form of 2 intellectual theft and is highly unethical. There are several types of plagiarism, including direct copying, paraphrasing, self-plagiarism, and patchwriting. Direct Copying Direct copying is the most obvious form of plagiarism. This occurs when someone takes another person’s words or ideas and uses them as their own without giving any credit to the original author (Nelson-Becker & Walker, 2018). This can include copying a sentence or paragraph from a book, article, or website without citing the source. It can also involve copying someone else’s paper or assignment. Paraphrasing Paraphrasing is another form of plagiarism. This occurs when a person rewrites someone else’s words or ideas in their own words without giving credit to the original author (Nelson-Becker & Walker, 2018). In order for it to not be considered plagiarism, the author must acknowledge the source and provide a citation in the text. 3 Self-Plagiarism Self-plagiarism is a type of plagiarism that occurs when an author reuses material from one of their own works without citation (Nelson-Becker & Walker, 2018). This can include reusing text, data, or images from a previous paper or assignment. In order to avoid self-plagiarism, authors must provide proper citations when reusing their own work. Patchwriting Patchwriting is a form of plagiarism that occurs when an author takes words or phrases from a source and rearranges them without changing the meaning (Nelson-Becker & Walker, 2018). In order to avoid patchwriting, authors must ensure that the words are their own and that the source is properly cited. Consequences of Plagiarism Plagiarism is a serious form of academic dishonesty and can have serious consequences for those who partake in it. The consequences of plagiarism depending on the severity of the violation,. For example, in academic settings, plagiarism can lead to loss of credit, suspension, or even expulsion (Nelson-Becker & Walker, 2018). In professional settings, plagiarism can lead to loss of job opportunities, damage to one’s reputation, or even legal action. 4 How to Avoid Plagiarism In order to avoid plagiarism, it is important to understand what it is and to remember to give credit to other authors when using their words or ideas. The best way to avoid plagiarism is to always cite sources when using another person’s words or ideas. Additionally, it is important to be aware of the different types of plagiarism and to ensure that one’s work is original and not copied from other sources. Citation Methods When citing sources, it is important to use a consistent style. The most commonly used citation style is the American Psychological Association (APA) style. This style requires authors to include in-text citations and a references section at the end of the paper. In-text citations should include the author’s last name, year of publication, and page number if applicable (APA, 2020). For example: (Smith, 2020, p. 5). 5 The reference section should include all sources that were cited in the paper in alphabetical order. Each entry should include the author’s last name, year of publication, title, and publisher. For example: Smith, J. (2020). The importance of citing sources. Publisher Name. Rules for Using Quotations When using quotations, it is important to follow the rules of the citation style that is being used. In APA style, short quotations (less than 40 words) should be included in the text of the paper and enclosed in quotation marks (APA, 2020). Long quotations (more than 40 words) should be indented and not enclosed in quotation marks (APA, 2020). Plagiarism Detection Tools There are several tools available to help detect plagiarism. The most common tool is Turnitin, which is an online plagiarism detection program. Turnitin is used by universities and other educational institutions to detect plagiarism in student work. Additionally, there are several other free tools available online, including Plagiarism Checker and Dupli Checker. 6 Conclusion In conclusion, plagiarism is a form of academic dishonesty that has serious consequences for those who partake in it. It is important to understand the different types of plagiarism and how to avoid them in order to produce original, ethical work. To avoid plagiarism, it is important to cite sources properly and to be aware of the rules for using quotations. Additionally, there are several tools available to help detect plagiarism. Word Count: 938 References American Psychological Association. (2020). Publication manual of the American Psychological Association (7th ed.). https://doi.org/10.1037/0000165-000 7 Nelson-Becker, H., & Walker, J. (2018). Plagiarism: What it is and how to recognize and avoid it. Reference Services Review, 46(4), 567-580. https://doi.org/10.1108/RSR-03-2018-0017 HW2: Formulation of a research problem (exercise 1) Guidance: a. Write your answers in this word document. Format your document name: FirstName_HW_2 b. Answer all the questions. If a question is not applicable, write N/A c. For any clarification, refer to the textbook exercise 1 d. Chapter 4 of the textbook will help you to work through this exercise. Objective: Formulate your research problem by raising questions and issues that will guide you to critically examine various facets and implications of what you are proposing to study. 1. Name a broad area of study in information security: Network Security 2. Divide the broad area selected into five subareas a. Firewalls b. Intrusion Detection/Prevention Systems c. Network Access Control d. Secure Protocols e. Data Loss Prevention 3. What subarea above would you like to select as your research study? I would like to select Firewalls as my research study. 4. What research questions do you hope to answer in your study? (Questions are worded in question form) 1. What are the best practices for implementing firewalls? 2. What security threats can firewalls help to mitigate? 3. What are the most common misconceptions about firewalls? 4. What are the benefits and drawbacks of different firewall configurations? 5. How can firewalls be monitored to ensure optimal performance? 5. What is the main objective of your study? (Use ACTION-ORIENTED WORDS) 1|Page The main objective of my study is to identify effective methods for protecting a network from unauthorized access and malicious activity. 6. What are the sub-objectives of your research? (use ACTION-ORIENTED WORDS) 1. To analyze existing firewall technologies and security protocols. 2. To evaluate the effectiveness of different firewall configurations. 3. To identify the most common misconceptions about firewalls. 4. To develop best practices for implementing and monitoring firewalls. 5. To determine the potential risks associated with using firewalls. 7. Complete the following table. (use text format if needed) Task What is involved Literature review Researching and 4-6 analyzing relevant weeks literature on the topic. Instrument construction Designing and creating a survey instrument to assess knowledge and attitudes related to firewall implementation. Administering the survey to a sample population. Analyzing the collected data using appropriate statistical methods. Writing a draft of the research report including the results and analysis. Editing, revising, and finalizing the report. Data collection Data analysis Draft report Final report Time Approx. needed cost Technical expertise needed Gaps in knowledge and skills No Cost Knowledge of the field of network security and understanding of research methods. 1-2 weeks No cost Knowledge of survey design and data collection methods. Understanding of the implications of different firewall configurations and the potential risks associated with them. Ability to create effective survey questions. 2-4 weeks No Cost Knowledge of survey administration and data collection methods. Ability to identify a representative sample population and collect accurate data. 2-4 weeks No cost Knowledge of statistical analysis and data interpretation. 1-2 weeks No cost Knowledge of research writing and report structure. Ability to identify the most relevant statistical methods and interpret the results. Ability to effectively communicate research results. 1-2 weeks No cost Knowledge of research writing and report Gaps in knowledge of report writing and formatting 2|Page structure. 8. What is the relevance of this study to theory? This study will contribute to the existing body of knowledge about firewall implementation and security protocols by providing evidence-based findings about the effectiveness of different firewall configurations. This will allow for further refinement of existing theories and contribute to the development of new theories about best practices for network security. 9. What is the relevance of this study to practice? The findings of this study will provide valuable insight into best practices for firewall implementation, as well as potential risks associated with different configurations. This information can be used by security professionals to ensure that their networks are as secure as possible, thus making them less vulnerable to malicious attacks. 10. Operationalize your concepts. (use text format if needed) Objectives/research questions Major concepts Indicators What are the best practices for implementing firewalls? Firewall implementation Number of rules, complexity logging Network size Percentage type of firewall type of protocol number of rules logging levels best practices Variables Unit of measurement What security threats can firewalls help to mitigate? Firewall security, security threats Malware phishing data leakage Network size, type of firewall, type of protocol Number of threats, types of threats What are the most common misconceptions about firewalls? Firewall misconceptions, user knowledge Common beliefs, knowledge gaps Improvement Percentage, Prevention Risk, Minimization number of misconceptions degree of protection provided Firewall configurations, benefits and drawbacks Security level, performance level Practices Percentage What are the benefits and drawbacks of different firewall configurations? Implementing/Managing security levels How can firewalls be monitored to ensure Firewall monitoring, Monitoring tools, Network size Number of monitors 3|Page optimal performance? performance levels logging activity type of firewall logging activity type of protocol 11. Operationally define your study population (Working definitions play a crucial role in avoiding ambiguities in the selection of a sample and help you to narrow your study population) The study population for this research is security professionals working in organizations of all sizes who are responsible for the implementation and maintenance of firewalls. These individuals must have a basic understanding of network security and the potential risks associated with firewall configurations. Create a new account of Zotero (http://www.zotero.com) or Mendeley (http://www.mendeley.com), build a bibliography related to your research area, and provide/answer the following questions. a. Show 10 references in APA format (Ahmed & Hossain, 2014; Alvaro Pérez Martín et al., n.d.; Bankston & Johnson, 2014; Chermack & Coons, 2012; Lin et al., 2014; Mark Ciampa, n.d.; (PDF) MODERN NETWORK SECURITY: ISSUES AND CHALLENGES, n.d.; Singh et al., 2016; Tayal et al., 2017; Thurimella & Baird, 2010) Ahmed, M., & Hossain, M. A. (2014). CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD. International Journal of Network Security & Its Applications (IJNSA), 6(1). https://doi.org/10.5121/ijnsa.2014.6103 4|Page Alvaro Pérez Martín, José Ramon López Lanza, & López Videras R. (n.d.). (PDF) Terapia física en el tratamiento de las enfermedades osteoarticulares. Retrieved January 18, 2023, from https://www.researchgate.net/publication/261877190_Terapia_fisica_en_el_tratamiento_de_las_ enfermedades_osteoarticulares Bankston, J. W., & Johnson, C. D. (2014). Network security fundamentals. Cengage Learning. Chermack, T. J., & Coons, L. (2012). Exploring the arts of crafting and delivering scenarios. International Journal of Technology Intelligence and Planning, 8(3), 233–253. https://doi.org/10.1504/IJTIP.2012.048572 Lin, G., Soh, S., Chin, K. W., & Lazarescu, M. (2014). Energy Aware Two Disjoint Paths Routing. Journal of Network and Computer Applications, 43, 27–41. https://doi.org/10.1016/J.JNCA.2014.04.004 Mark Ciampa. (n.d.). Security+ Guide to Network Security Fundamentals - Mark Ciampa - Google Books. Retrieved January 18, 2023, from https://books.google.com/books?hl=en&lr=&id=VWsJAAAAQBAJ&oi=fnd&pg=PR3&dq=Network+s ecurity+fundamentals&ots=xnM2PlK56B&sig=Z286xE0pWOZXnKEfCLQSpyneWE#v=onepage&q&f=false (PDF) MODERN NETWORK SECURITY: ISSUES AND CHALLENGES. (n.d.). Retrieved January 18, 2023, from https://www.researchgate.net/publication/267691532_MODERN_NETWORK_SECURITY_ISSUES_A ND_CHALLENGES Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200–222. https://doi.org/10.1016/J.JNCA.2016.09.002 Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review paper on Network Security and Cryptography. 10(5), 763–770. http://www.ripublication.com Thurimella, R., & Baird, L. C. (2010). Network security. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, 1–31. https://doi.org/10.4018/978-1-61520-7831.CH001 b. Show 10 references in MLA format 5|Page C. Which format do you prefer and why? I prefer APA format because it is the most commonly used style for academic writing, particularly in the sciences. Additionally, it is easy to use and understand, with a clear structure that makes it simple to find the information needed. It also provides clear guidelines for citing sources, which makes it easier to avoid plagiarism. 6|Page HW 4: Developing a research instrument (exercise 3) Your research study topic (as indicated in #3 in HW_ 2): Network Security Guidance: a. Write your answers in this word document. Format your document name: FirstName_HW_4. b. Answer all the questions. If a question is not applicable, write N/A c. When formulating the questionnaire, examine the relevance and justification of each question about the objectives of your study. d. Interview or complete the questionnaire yourself, then ask the pre-test respondents while amending the instrument before finalizing the questionnaire. e. For any clarification, refer to the textbook exercise 3 f. Chapter 9 of the textbook will help you to work through this exercise. Objective: Construct a research instrument based on the research approach. 1. Map the subobjectives into research questions Subobjective Research Question To analyze existing firewall technologies and security protocols To evaluate the effectiveness of different firewall configurations To identify the most common misconceptions about firewalls. To develop best practices for implementing and monitoring firewalls. To determine the potential risks associated with using firewalls. What are the best practices for implementing firewalls? What security threats can firewalls help to mitigate? What are the most common misconceptions about firewalls? How can firewalls be monitored to ensure optimal performance? What are the benefits and drawbacks of different firewall configurations? 2. Map research questions into questions in your questionnaire Research question Relevant questions in the questionnaire What are the best practices for implementing What are the essential features of a firewall? firewalls? What are the recommended firewall deployment strategies? What are the best practices for configuring a firewall? What are the important factors to consider when choosing a firewall vendor? How can a firewall be optimized for performance and security? What security threats can firewalls help to What types of threats can firewalls protect mitigate? against? How effective are firewalls at blocking different types of threats? Can firewalls be used in combination with other security measures? What are the limitations of firewalls in protecting against certain types of threats? What are the most common misconceptions What are some common myths about about firewalls? firewalls? How do these myths affect the way you use and configure firewalls? What are the potential risks of believing in these myths? What are the facts behind these myths? How can firewalls be monitored to ensure optimal What are the key performance indicators for performance? a firewall? What tools and techniques can be used to monitor a firewall? How often should a firewall be monitored? What are the best practices for troubleshooting firewall performance issues? What are the benefits and drawbacks of different What are the different types of firewall firewall configurations? configurations? What are the benefits and drawbacks of each configuration? What factors should be considered when choosing a firewall configuration? How do different firewall configurations affect network performance and security? Network size, type of firewall, type of protocol, Improvement, Prevention, Risk, Minimization, Practices, Implementing/Managing 3. List independent and dependent variables Independent variable Dependent variables Firewall implementation practices effectiveness of firewall implementation Firewall security measures level of security threat mitigation misconceptions about firewalls impact of misconceptions on firewall usage and configuration firewall monitoring techniques optimal firewall performance firewall configurations trade-off between firewall benefits and drawbacks 4. Formulate the questionnaire using the Google form and append it below. https://docs.google.com/forms/d/e/1FAIpQLSdf8CXziEk4ijorvl0MznMuXwgl61LE4W8ewMt0sGI ZHis-jw/viewform?usp=pp_url
Purchase answer to see full attachment
Explanation & Answer:
800 Words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here we go! Kindly go through it and let me know what you think.

1

Report

Student’s Name
Institutional Affiliation
Course Title: Course Code
Instructor’s Name and Title
Assignment Due Date

2

Report
Meaning and Reasons for Research
Research is a structured inquiry that utilizes acceptable scientific methodology to solve
problems and create new knowledge that is generally applicable (Ulfayantik et al., 2022). The
reasons for conducting research are to comprehend a field in which you are studying or working,
explain and seek answers in relation to what you observe and scrutinize specific aspects. They are
important because they provide a clear purpose and direction for the research, and help ensure that
resources are allocated effectively. For example, a researcher studying a new medical treatment
may conduct research to determine its safety and effectiveness, understand how it works in the
body, and identify any potential side effects.
Paradigms and Process of Research
Based on research methodology, there are three approaches: quantitative, qualitative, and
mixed methods. Quantitative research is a systematic, scientific, or positivist approach to social
inquiry. Qualitative research is an ethnographic, ecological, or naturalistic approach. Mixed
methods research is a combination of quantitative and qualitative approaches. They give a
framework for comprehending the nature of knowledge as well as the processes through which it
is formed and gained. A researcher examining the impact of social media on mental health, for
example, would use a qualitative research paradigm, conducting in-depth interviews and focus
groups to learn about participants' experiences and viewpoints.
The Function of Literature Review and the Considerations in Selecting a Research
Problem

3

A literature review is a ...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags