Category Archives: Cryptography

paper formating and sources are optional. please read the instructions carefull

paper formating and sources are optional.
please read the instructions carefully.
Each question is marked as [O] or [S] denoting Objective or Subjective respectively. The first 4 questions are O’s while the remaining 4 are S’s. [O] questions have a well-defined correct answer and will be graded accordingly. An explanation of the answer is required. Keep your answer to the point. [S] questions can have several “correct” answers and will be graded accordingly. Formulate your response with the following mindset: Suppose you are the security expert in your organization and your boss poses this question to you for your expert opinion. How would you respond? • Answers are anticipated to require a short paragraph. Say 5-6 lines at most. However, no minimum or maximum size is specified. Use your judgement. Stay on topic and address the question.
The Questions and required text book are attached below.

1. The text should be divided into sections with the heading. 2. Write paper on

1. The text should be divided into sections with the heading.
2. Write paper on your own words, do not copy text from internet or any other sources.
Use wide range of sources to research your topic. You are expected to use journal articles, recent texts and web resources.
Each time you refer to a source (such as a book, data, journal article, or website), you need to include a citation that gives credit to the original author.
• Place bracketed citations within the line of text, before any punctuation, with space before the first bracket.
Number your sources as you cite them in the paper. Once you have referred to a source and given it a number, continue to use that number as you cite that source throughout the paper.
When citing multiple sources at once, the preferred method is to list each number separately, in its own brackets, using a comma or dash between numbers, as such: [1], [3], [5] or [1] – [5].
Paper Template has been attached as an Example

Cloud computing security The research project will give the graduate student an

Cloud computing security
The research project will give the graduate student an opportunity to think independently to address issues in an area of network security that is of interest to the student. The work should be documented in the form of an analytic research paper, which includes a review of the recent literature of a topic approved by your instructor.
Please submit a short research proposal (no more than 2 pages, double spaced) of your topic (Title, Abstract and Bibliography) by the fourth week of the course. You may supplement and/modify the references proposed in the final report. There is no grade for this proposal. The purpose of this activity and your instructor’s review of your proposal is to help ensure that you have chosen a topic which can be researched (i.e. there is sufficient support in the professional literature) and which is relevant to this course and this assignment.
The research project should review the literature (professional journals and publications), distill the primary issues, discuss the various possible solutions to the issues raised, identify “trends,” and formulate a position. The final output is a paper, 10-12 pages double-spaced, exclusive of cover, title page, table of contents, end notes and bibliography. The paper must use APA formatting, citations, and reference list with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. This report is due at the end of the 11th week of the course. The paper will account for 20% of the semester grade. The paper will be graded on technical content, format, clarity, and writing skill.
The rubric for the paper is as follows:
Abstract (Short summary of problem, approach, expected/final result): 5%
Clear statement of problem(s) investigated: 10%
Technical Content (depth and accuracy of information and analysis, originality): 50%
Results and Conclusion: 15%
Clarity, organization, grammar and spelling: 10%
Sufficient and appropriate references and their citing (in APA Style): 10%
These are only general suggestions in a random order. If you have a specific topic, in which you have interest, please describe it, so your instructor can evaluate its suitability. Remember, that since most of the topics are very broad, you should narrow down your research to some specific subtopic or technical aspects related to the subject. Ideally, try to focus upon real situations in an organization.
Please Note: Your research paper will be scanned using Turn It In.
A good book on the basics of good writing is The Elements of Style by William Strunk Jr. and E. B. White, Macmillan, New York, third edition, 1979. The full text of the 1918 edition is out of copyright and available online.
Another report on technical writing in computer science domain is: Technical Writing for Computer Engineers and Computer Scientists by Kevin Karplus and Dan Scripture.