Part 1
Overview: Using mentor or model texts is a strategy to improve your own writing. The New York Times describes mentor texts as, “Demystifying the writing process via examples students can learn from and emulate.” In this assignment, you will locate a mentor text in the form of a dissertation that may or may not be similar to your own topic to use as a model while you write your chapter 2. It is most helpful to find a dissertation with a literature review similar to your own, but if that is not possible, you may look for the next best option. Directions:
- Use ProQuest Dissertations & Theses Global database on the UC Library website to locate mentor text dissertation (preferably it would be related to your topic).
- You may need to use advanced search options to help narrow your search.
- Scan read the entire dissertation.
- Carefully read the literature review section.
- Provide a one-paragraph summary of the entire literature review.
- Write a second paragraph about what you learned through reviewing chapter 2.
Additional Information: ProQuest Dissertations & Theses Global database is accessible through the Databases link below the blue picture on the Library website. The Databases tab will access an alphabetical list of the Library databases. The dissertation database is listed twice, as Dissertations and Theses and as ProQuest Dissertations and Theses. Both links access the same database. Many of the dissertations published since 1997 are available in full text with a link to the PDF. Here is the link to the P section of the database listings
https://ucumberlands.libguides.com/az.php?a=p
My Dissertation topic is Cyber Security
Part 2
Please write 250-300 words on the gaps on the research work done on Cyber security and literature review for the same. Please use the attached document as a reference to narrow down the gaps that can be researched further on.
4
Topic Identification
The topic getting studied is cyber security which is highly imperative in the current digital world since many people are relying on information technology (IT) for their daily needs. The IT environment requires transforming existing operations to ensure it can deal with emerging security issues. The proposed transformation of legacy systems to advanced cybersecurity operations like cloud, hardware, software, application, and Internet of Things (IoT) security are all imperative. They ensure effective communication can be attained in the network so there would be faster and more accurate transactions. It is possible to establish fast internet connections when security operations are integrated to enhance reliable user operations.
Cited Problem
There is a problem which is called cyber security challenges that have affected many devices depending on IT. According to Li & Liu (2021), cyberattacks have been an emerging threat affecting different persons when they use devices connected to the internet where malicious users infect the devices, causing security threats to stored data. Internet operations are related to security since there is a possibility of enhancing faster communication devices using good internet speeds. The types of cyber-attacks affecting different systems are insider threats, malware, phishing, denial of services, viruses, worms, or Trojan horse attacks (Li & Liu, 2021). Vulnerabilities can be introduced here as IT personnel aware of cyber-attack techniques could eliminate a secure environment once there is a seamless and accurate connection to their intended devices.
Population Getting Addressed
The population getting addressed includes persons who create cyber-attacks and those affected by the attacks. The primary sources of cyber threats are foreign countries, groups, hackers, internal employees, or terrorists (Li & Liu, 2021). Security must be implemented in different systems when common cyber-attacks are managed. The switches would enable the IT environment to connect all components requiring constant communication. The remote access functionality promotes the company’s operations since it can implement network access controls that enable employees to work from any location.
Methodology to Get Used
The research shall integrate a qualitative research design since it majorly relies on interpretive and investigative techniques. There can be an accurate analysis of actual data studying cybersecurity issues.
Article Assessment
An article by Moustafa et al. (2021) used a qualitative research process to illustrate how cybersecurity challenges have been frequently dislodged on many user devices. The research question was to determine the role of user behaviour when improving cybersecurity. The application of a literature review illustrated that user behaviour needs to change so that there would be no introduction of vulnerabilities to any system.
References
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments.
Energy Reports,
7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126.
Moustafa, A. A., Bello, A., & Maurushat, A. (2021). The role of user behaviour in improving cyber security management.
Frontiers in Psychology,
12. https://doi.org/10.3389/fpsyg.2021.561011