Describe methodology approach and technologies to be used


Assignment: MAJOR PROJECT PROPOSAL Relating To IT Networking Security

This proposal does not have an indicated topic, but the topic itself must have some relationship with the networking security area. You can think of any topic as long as it is suitable.

Basically, the project proposal consists the following components:

o Project Description: give a description of the major project

o Problem statement & Backgroud: provide extensive background to the problem. An extended background of the problem, the nature and complexity of the problem to be solved should be included.

o Complexity: highlight the complexity of the problem to be solved

o Scope & Depth: define the scope and the depth of the major project

o Test Plan: A detailed test plan may include the procedures, methodology, tools used, verification, pass/fail criteria, or examples of test cases

o Methodology: describe the methodology, approach, and technologies to be used

o System/software Architecture diagram: include a system/software architecture diagram.

o Innovation(Most important part): highlight the innovative components, as the major project should contain some elements, which are deemed to be innovative, experimental or exploratory in nature.

It is strongly recommended that new leading edge technologies, even experimental, be considered. Even if these technologies are not required by the industry sponsor or client, or practically feasible, research on these areas should be included as part of the proposal.

o Technical Challenges(Most important part): highlight expected technical challenges, which could include information regarding what will be learned above and beyond what is taught in the classroom while researching for the project

o Milestones: provide details about estimated milestones in terms of time and effort.

Format your assignment according to the following formatting requirements:

o The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

o The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

o Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Describe methodology approach and technologies to be used
Reference No:- TGS03104918

Expected delivery within 24 Hours