Thursday, October 17, 2019

Information Security Essay Example | Topics and Well Written Essays - 3750 words

Information Security - Essay Example Although a voluminous amount of information which talks about cyber attacks has already been presented, there exist several lapses involving properly recognizing security defense weaknesses and how perpetrators breach computer security. Hence, the purpose of this paper is to address the aforementioned topics, which were not discussed in the previous work. Apart from reviewing security bypass strategies, a study design and possible ways to analyze future data will also be addressed. In the context of computers, the security of data will be difficult to manage if the criteria for proper management will not be converted to something that is measurable. Thus, the quantitative aspects cannot be overlooked because these will allow the researchers to better assess the strength of the system to put off any form of security breach to the system or its capability to hold off cyber attacks. This paper starts off with a brief review of the different research method designs: qualitative, quantitative, or both, and an explanation of the importance of each design over the other. After which, the research questions will be presented, followed by a detailed description of how the research design will be implemented including the inherent limitations and validity issues of the chosen design. Prior to discussing the process of data collection, the functions of the researcher will be briefly tackled. Thereafter, an explanation why the mixed method design was chosen over the other approaches will be provided, wherein the validity and quality of the data that will be retrieved using the said methodology will be established. Moreover, the ways of managing the collected data will also be described. A discussion of the mixed method design, in the context of holistic perspectives will follow, which will be used as a guide to analyze the retrieved data. It has been well established that the preconceived notions of the researchers over which research design to use, how

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.