• Home
  • Blog
  • IT Security Controls, Plans, and Procedures

IT Security Controls, Plans, and Procedures

0 comments

IT Security Controls, Plans, and Procedures

The deliverables of the project should include:

1. A report with the following sections

a. Abstract: summary of problem statement presented in the papers.

b. Introduction: discuss the chosen paper’s proposed solution. These should be illustrated
using text and diagrams.

c. Taxonomy: classification of the papers proposed solution and comparison between them.

d. State-of-the-art: includes the existing solutions (mechanisms, protocols, procedures,
standards, etc.)

e. Discussion: The student must criticize the proposed solution. It is highly recommended to
propose a possible solution or alternative for some of the weaknesses of the chosen
papers wherever that is possible.

f. References: The citation should follow the APA style. (5pages)

g. The template of the article can be found in:
https://www.ieee.org/content/dam/ieee-org/ieee/web…

(IEEE -4 pages)

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}