Project's Proposal
Project's Proposal
Project's Proposal
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
PROJECT PROPOSAL<br />
MASTER IN COMPUTER SCIENCE (INFORMATION SECURITY)<br />
TITLE OF PROJECT<br />
YOUR CHOSEN PROJECT TOPIC<br />
Prepared by:<br />
Your Name<br />
(metric card number)<br />
Supervisor<br />
Supervisor’s name<br />
Date:<br />
99/99/9999
Sample <strong>Proposal</strong><br />
2<br />
TABLE OF CONTENTS<br />
CONTENTS<br />
PAGE<br />
1.0 Introduction…………………………………………………………….…9<br />
1.1 Background of the problem……………………………………… 9<br />
1.2 Problem Statement………………………………………………..9<br />
1.3 Project Aim………………………………………………………. 9<br />
1.4 Project Objectives…………………………………………………9<br />
1.5 Project Scope………………………………………………………9<br />
2.0 Literature Review ……………………………………………………...… 9<br />
3.0 Methodology …………………………………………………………..… 9<br />
4.0 Expected Outcome …………………………………………………….… 9<br />
5.0 Conclusion…………………………………….…………………………. 9<br />
References……………………………………………………………….. 9<br />
Gantt Chart……………………………………………………………….. 9
Sample <strong>Proposal</strong><br />
3<br />
1.0 Introduction<br />
Introduce the reader to the area in which you will be working. This includes basic<br />
definitions and explanations geared towards your area of interest. Current statistics<br />
depicting trends to real situations are acceptable.<br />
Examples of introduction:<br />
Example 1:<br />
Developments in Information and Communication Technologies (ICTs) have impacted all<br />
sectors such ……To ensure effective working of information security, various controls<br />
and measures had been implemented ….. However, lack of proper ….. Undoubtedly, the<br />
most important of these controls is the …… Hence, this project examines….<br />
Example 2:<br />
A wireless local area network is ….<br />
WLAN have gained popularity….. The emphasis is … This project is concerned about<br />
security issues…. However, this project will only focus on … which ….<br />
Example 3:<br />
An access control is …. However, human authentication is the security task…. However,<br />
…. A more practical approach is to…. This project implements …. by using …….<br />
1.1 Background of the Problem<br />
Proceed to describe what sort of work has already been done and exactly what you<br />
propose to do, going into as much detail as possible. Indicate the technical importance<br />
and/ or interest of your proposed work. In discussing previous work you should cite<br />
references gathered in a literature search including critiques and summaries of the<br />
references read and cited.
Sample <strong>Proposal</strong><br />
4<br />
1.2 Problem Statement<br />
Examples of problem statement:<br />
Example 1:<br />
A review on the list of journal listed in ….. This shown that there is no research<br />
had been conducted for other aspect of …..<br />
As the …is responsible for preparing the … This will provide some assurance that<br />
the university’s resources will be taken care and effectively protected. …Hence, a study<br />
on the …. with regards to ….. is needed due to lack of empirical study on this area.<br />
Example 2:<br />
Wireless environment is not restricted to…. Many researches carried out to…. However,<br />
not all of them are effective … In contrast, the proposed project is a ….<br />
Example 3:<br />
Statistics showed that there is an urgent need to protect multimedia content…. The<br />
estimated trade loss was…. Thus to reduce the impact of threats … security awareness is<br />
extremely important in……<br />
1.3 Project Aim<br />
Example 1:<br />
The aim of this study is to investigate and examine …..<br />
Example 2:<br />
The aim is to make the client and the machine authentication ….<br />
Example 3:<br />
The aim is to have a Malaysian Law Enforcement policy and procedure in handling<br />
digital evidence for cyber crime cases ….
Sample <strong>Proposal</strong><br />
5<br />
1.4 Project Objectives<br />
It is recommended you have only three (3) objectives for your project.<br />
Some examples for Objective One:<br />
• To investigate the …<br />
• To determine the ….<br />
• To examine the ….<br />
• To identify ….<br />
•<br />
Some examples for Objective two:<br />
• To design…..<br />
• To compare<br />
• To enhance….<br />
• To integrate….<br />
• To automate…<br />
•<br />
Some examples for Objective Three:<br />
• To measure<br />
• To evaluate<br />
1.5 Project Scope<br />
The scope for this study focuses on…..<br />
• A laboratory-based project. Laptop – To prepare a project paper, to surf internet<br />
valuable materials or references and to execute test of analysis.<br />
• Will address investigation steps on major phases of digital evidences.<br />
• Interview – To understand and to have richer explanation on …..
Sample <strong>Proposal</strong><br />
6<br />
• Develop Questionnaires and conduct a survey – To obtain feedback from IT<br />
management and operational employee.<br />
• Conducting interviews with selected ….<br />
• Software requirements MPLAB® IDE…….<br />
• Use Statistical software – To perform data analysis including solutions for Data<br />
Integration, Analytics and Business Intelligence i.e. SAS® Statistical Analysis<br />
ver… or Amos ver….<br />
2.0 Literature Review<br />
The literature review discuses several basic knowledge. Review past researches<br />
which explore issues, theories found in scholarly writings and provides<br />
explanations, summary and critical evaluation on related works done.<br />
3.0 Methodology<br />
How the research is going to be executed?<br />
Develop prototype / Simulation / Survey/ Interview / Focus Group/ Mixed Method<br />
4.0 Expected Outcome<br />
Examples<br />
Model / Framework / Instrument / Prototype / Measurement / Questionnaire<br />
5.0 Conclusion<br />
ICT provides great opportunity …… However, lack of security control would<br />
impede …. in meeting the objectives. Failure to have a comprehensive … may put the …<br />
exposed to threats. Additionally, the …. Therefore, there is a need for …..
Sample <strong>Proposal</strong><br />
7<br />
References<br />
www.sps.utm.my)<br />
(refer to Theses Manual-July, 2007 for details, found from<br />
Either use<br />
Harvard System (Author and Year system)<br />
Examples<br />
Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2010b). Resolved-Acceleration Control of<br />
Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474.<br />
Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice Hall<br />
International Ltd.<br />
Or use<br />
Number System<br />
[1] Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice<br />
Hall International Ltd.<br />
[2] Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2008b). Resolved-Acceleration Control of<br />
Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474.<br />
Appendix: Gantt Chart