25.10.2014 Views

Project's Proposal

Project's Proposal

Project's Proposal

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PROJECT PROPOSAL<br />

MASTER IN COMPUTER SCIENCE (INFORMATION SECURITY)<br />

TITLE OF PROJECT<br />

YOUR CHOSEN PROJECT TOPIC<br />

Prepared by:<br />

Your Name<br />

(metric card number)<br />

Supervisor<br />

Supervisor’s name<br />

Date:<br />

99/99/9999


Sample <strong>Proposal</strong><br />

2<br />

TABLE OF CONTENTS<br />

CONTENTS<br />

PAGE<br />

1.0 Introduction…………………………………………………………….…9<br />

1.1 Background of the problem……………………………………… 9<br />

1.2 Problem Statement………………………………………………..9<br />

1.3 Project Aim………………………………………………………. 9<br />

1.4 Project Objectives…………………………………………………9<br />

1.5 Project Scope………………………………………………………9<br />

2.0 Literature Review ……………………………………………………...… 9<br />

3.0 Methodology …………………………………………………………..… 9<br />

4.0 Expected Outcome …………………………………………………….… 9<br />

5.0 Conclusion…………………………………….…………………………. 9<br />

References……………………………………………………………….. 9<br />

Gantt Chart……………………………………………………………….. 9


Sample <strong>Proposal</strong><br />

3<br />

1.0 Introduction<br />

Introduce the reader to the area in which you will be working. This includes basic<br />

definitions and explanations geared towards your area of interest. Current statistics<br />

depicting trends to real situations are acceptable.<br />

Examples of introduction:<br />

Example 1:<br />

Developments in Information and Communication Technologies (ICTs) have impacted all<br />

sectors such ……To ensure effective working of information security, various controls<br />

and measures had been implemented ….. However, lack of proper ….. Undoubtedly, the<br />

most important of these controls is the …… Hence, this project examines….<br />

Example 2:<br />

A wireless local area network is ….<br />

WLAN have gained popularity….. The emphasis is … This project is concerned about<br />

security issues…. However, this project will only focus on … which ….<br />

Example 3:<br />

An access control is …. However, human authentication is the security task…. However,<br />

…. A more practical approach is to…. This project implements …. by using …….<br />

1.1 Background of the Problem<br />

Proceed to describe what sort of work has already been done and exactly what you<br />

propose to do, going into as much detail as possible. Indicate the technical importance<br />

and/ or interest of your proposed work. In discussing previous work you should cite<br />

references gathered in a literature search including critiques and summaries of the<br />

references read and cited.


Sample <strong>Proposal</strong><br />

4<br />

1.2 Problem Statement<br />

Examples of problem statement:<br />

Example 1:<br />

A review on the list of journal listed in ….. This shown that there is no research<br />

had been conducted for other aspect of …..<br />

As the …is responsible for preparing the … This will provide some assurance that<br />

the university’s resources will be taken care and effectively protected. …Hence, a study<br />

on the …. with regards to ….. is needed due to lack of empirical study on this area.<br />

Example 2:<br />

Wireless environment is not restricted to…. Many researches carried out to…. However,<br />

not all of them are effective … In contrast, the proposed project is a ….<br />

Example 3:<br />

Statistics showed that there is an urgent need to protect multimedia content…. The<br />

estimated trade loss was…. Thus to reduce the impact of threats … security awareness is<br />

extremely important in……<br />

1.3 Project Aim<br />

Example 1:<br />

The aim of this study is to investigate and examine …..<br />

Example 2:<br />

The aim is to make the client and the machine authentication ….<br />

Example 3:<br />

The aim is to have a Malaysian Law Enforcement policy and procedure in handling<br />

digital evidence for cyber crime cases ….


Sample <strong>Proposal</strong><br />

5<br />

1.4 Project Objectives<br />

It is recommended you have only three (3) objectives for your project.<br />

Some examples for Objective One:<br />

• To investigate the …<br />

• To determine the ….<br />

• To examine the ….<br />

• To identify ….<br />

•<br />

Some examples for Objective two:<br />

• To design…..<br />

• To compare<br />

• To enhance….<br />

• To integrate….<br />

• To automate…<br />

•<br />

Some examples for Objective Three:<br />

• To measure<br />

• To evaluate<br />

1.5 Project Scope<br />

The scope for this study focuses on…..<br />

• A laboratory-based project. Laptop – To prepare a project paper, to surf internet<br />

valuable materials or references and to execute test of analysis.<br />

• Will address investigation steps on major phases of digital evidences.<br />

• Interview – To understand and to have richer explanation on …..


Sample <strong>Proposal</strong><br />

6<br />

• Develop Questionnaires and conduct a survey – To obtain feedback from IT<br />

management and operational employee.<br />

• Conducting interviews with selected ….<br />

• Software requirements MPLAB® IDE…….<br />

• Use Statistical software – To perform data analysis including solutions for Data<br />

Integration, Analytics and Business Intelligence i.e. SAS® Statistical Analysis<br />

ver… or Amos ver….<br />

2.0 Literature Review<br />

The literature review discuses several basic knowledge. Review past researches<br />

which explore issues, theories found in scholarly writings and provides<br />

explanations, summary and critical evaluation on related works done.<br />

3.0 Methodology<br />

How the research is going to be executed?<br />

Develop prototype / Simulation / Survey/ Interview / Focus Group/ Mixed Method<br />

4.0 Expected Outcome<br />

Examples<br />

Model / Framework / Instrument / Prototype / Measurement / Questionnaire<br />

5.0 Conclusion<br />

ICT provides great opportunity …… However, lack of security control would<br />

impede …. in meeting the objectives. Failure to have a comprehensive … may put the …<br />

exposed to threats. Additionally, the …. Therefore, there is a need for …..


Sample <strong>Proposal</strong><br />

7<br />

References<br />

www.sps.utm.my)<br />

(refer to Theses Manual-July, 2007 for details, found from<br />

Either use<br />

Harvard System (Author and Year system)<br />

Examples<br />

Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2010b). Resolved-Acceleration Control of<br />

Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474.<br />

Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice Hall<br />

International Ltd.<br />

Or use<br />

Number System<br />

[1] Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice<br />

Hall International Ltd.<br />

[2] Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2008b). Resolved-Acceleration Control of<br />

Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474.<br />

Appendix: Gantt Chart

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!