This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Dissertation (Major Computing Project)

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Dissertation (Major Computing Project)

Submit this Project Suggestion Form through Moodle

Coordinator’s Email: qahe.computingprojects@qa.com

 

Student Project Suggestions Form

 

Students must use this form to suggest a topic(s) for their Final Year Dissertation. It is important that each form is completed as much as possible and enough information is provided in the tables to enable the Dissertations’ Coordinator to judge the suitability of the Suggested topic(s) as a final year degree project based on the specifications of the course that you are studying. Once a topic suggestion is accepted a suitable supervisor will be assigned.

 

It is strongly advised that students prior to submitting their Project Suggestions Form undertake and complete the exercises on ‘Personal Reflection and Career Aspirations’ in Tutorial 1 and also consider the following issues:

  • Self-evaluate where your strengths and weaknesses lie
  • an area or topic that you have enjoyed during your studies and wish to focus on further
  • a topic you would like to investigate and gain considerable understanding and knowledge
  • area(s) you may be interested in specialising
  • area(s) you may wish to gain employment in upon your graduation
  • area(s) with high demand and potential for employment

 

All students must suggest at least 1 and not more than 2 different project topics. Suggest the topics in order of preference.

 

Once completed this form must be uploaded to Moodle via the link:  ‘Project Suggestions Form’.

 

Please name your file as:    StudentID-Surname-Firstname-Project-Suggestions-Form
Example of filename:          B12345678-Ioannides-Nicholas-Project-Suggestions-Form

 

 

Student’s Details
Name
ID
University Email
Module Code

 

Project Suggestion – Choice #1
Area of InterestCyber security
Indicative TitleCloud security
Description

(200-300 words)

The Internet has become a center of development in the 21st century. In some countries, it is even a fundamental human right, and means are always created to make it easily accessible. Some large companies have also taken steps to make the Internet freely available to people. For example, Facebook teamed up with other global players to introduce internet.org, a project that provides free access to the Internet in Third World countries. With the expansion of the Internet, more work has been done to connect devices. This was required by the ubiquitous calculation. In addition, the idea of ​​ensuring that everything could be connected led to the creation of the Internet of Things (IoT).

Therefore, multiple devices or “objects” are connected, creating a high affinity for data storage. The storage space faces the latest innovations from the digital world. Cloud Computing introduced a solution providing Infrastructure as a Service (IaaS) as cloud storage. Since most companies are moving their technology to the cloud, security is the main issue that needs to be highlighted. This is because lack of proper security means that companies can lose valuable information to malicious people. Cloud computing is divided into two, Infrastructure as a service and a platform as a service.  Both of these cloud services need security. The first way of ensuring that cloud security is safe is by encrypting information. This dissertation would look at data security in cloud storage.

Methodology

(100-200 words)

The method that would be used would be quantitative. Data would be collected from companies that use cloud storage services. The data includes how safe their data is compared to the local storage of data. Whether they have ever faced any data breach and how the data is reliable. The quantitative method is appropriate for this research since it involves data analysis, which will include analyzing the number of companies that prefer cloud computing. It would make it easier when recommending the best storage form of data, whether local or cloud computing. The data collection method also needs one on one meeting with the concerned companies.
DeliverablesReliability of data in cloud storage.

 

Project Suggestion – Choice #2
Area of InterestCybersecurity
Indicative TitleIdentity theft in the Internet
Description

(200-300 words)

Since the introduction of the Internet, hackers have found a platform to perform many crimes. The reason behind this is the loopholes of security among different platforms. One of the common crimes is identity theft. Identity theft entails taking a person’s information and using it for pretense. A good example is how someone can take a person’s credit card and be able to order goods online using the person’s information such as email or even use his or her image.

In the recent past, there has been many cases of identity theft that have been reported. Though different agencies have tried to come up with different solutions to this vice. One of the solutions is educating the public on the need to protect their information. The could do so by logging out of their computers whenever they finish using it. This measures are not enough since fraudsters are developing new methods each day. This research would look at ways in which identity theft can be reduced using a technological approach. It would also recommend software that could be used to assist in identifying people who are behind theft in the Internet. The main aim is to significantly reduce the cases of identity theft.

 

Methodology

(100-200 words)

The methodology used in this case would be quantitative research. It will involve interviewing people and also use of questionnaires. Participants would state whether they have ever encountered any identity theft over the Internet and how they were able to react. This data would then be analysed using the software called spss. It would determine the percentage of people who have been affected by identity theft. This will determine whether identity theft is on the rise or not. This would make it easier for the recommendation of that appropriate security option. Also cost is one of the main factor in choosing methodology of conducting research.

 

DeliverablesRate of identity theft cases

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask