0% found this document useful (0 votes)
13 views

assignment 2

The document outlines the instructions for an individual assignment due on April 3, 2024, for the BBIT class. It specifies formatting requirements and provides a list of potential topics related to cybersecurity for the research paper. The paper must include sections such as introduction, methods, literature review, discussion, conclusion and recommendations, and references, and should not exceed 10 pages.

Uploaded by

pick83004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

assignment 2

The document outlines the instructions for an individual assignment due on April 3, 2024, for the BBIT class. It specifies formatting requirements and provides a list of potential topics related to cybersecurity for the research paper. The paper must include sections such as introduction, methods, literature review, discussion, conclusion and recommendations, and references, and should not exceed 10 pages.

Uploaded by

pick83004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

INSTRUCTIONS

1. DUE DATE: 03 April 2024

2. CLASS: BBIT

3. TYPE OF ASSIGNMENT: INDIVIDUAL ASSIGNMENT

4. FONT TYPE: BOOKMAN OLD STYLE

5. FONT SIZE: 10

6. LINE SPACING: 1.5

7. THE ASSIGMENT SHOULD NOT EXCEED 10 PAGES.

8. SUBMISSION VIA E-LEARNING PORTAL

Choose one topic:

1. Cybersecurity Risks and Challenges in the Healthcare Industry


2. Privacy-Preserving Technologies in the Digital Age
3. Security Challenges in 5G Networks and Beyond
4. quantum Cryptography: Advancements and Implications for Cybersecurity
5. Threat Intelligence Sharing and Collaboration among Organizations
6. Blockchain Technology for Enhancing Cybersecurity
7. Internet of Things (IoT) Security: Challenges and Solutions
8. Biometric Authentication Systems: Vulnerabilities and Countermeasures
9. Ransomware Evolution and Prevention Strategies
10. Insider Threat Detection and Prevention in Organizations
11. Cybersecurity in Cloud Computing Environments
12. Network Intrusion Detection and Prevention Systems: Enhancements and Challenges
13. Software-Defined Networking (SDN) Security: Vulnerabilities and Countermeasures
14. Data Leakage Prevention Techniques in Enterprise Networks
REQUIREMENT:
Write a research paper using the following format

i. Introduction

ii. Methods

iii. Literature review

iv. Discussion

v. Conclusion and recommendations

vi. Reference

You might also like