TCP IP network security Finding a Research Topic

Document Type:Research Paper

Subject Area:Technology

Document 1

Every day, technological devices become more efficient in speed, size, and convenience. Hardware and software advancements in technologies have made human life easier and more convenient. However, in as much as these developments are beneficial to humans, they come with numerous sets of problems. Research is one of the ways of solving some of these problems. As such, with the existence of numerous problems in Information Technology, choosing an appropriate topic to help in solving a particular problem is challenging. I then made notes of these words for later use when searching catalogs and databases. Step 4: Being Specific After making a list of keywords for the topics, the next step was being specific to the possible topics of study. This step was useful because it helped me in determining whether or not my possible topics had depth and were worth researching.

Sign up to view the full document!

The underlying concept of this step was getting a broad idea of the study and then extracting a particular element of that idea that is worth researching (Bryman & Bell, 2015). For the topics I considered worth studying, I took the narrower ideas and made them even more specific. Some of the tools are anti-malware programs, data execution prevention, file integrity checks, data loss prevention, application whitelisting, firewalls, and intrusion detection. I also chose the topic of “Human Beings as Security Weaknesses” because I discovered that most of the major IT security breaches are spread by people. Human beings can easily be tricked. Nowadays, it is easy to get people to unwittingly grant their email access to fraudsters, click links to dubious websites, and forward emails with infected attachments.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable