LITERATURE REVIEW OUTLINE EXAMPLE ONLY

LITERATURE REVIEW OUTLINE EXAMPLE ONLY

 

Don't use plagiarized sources. Get Your Custom Essay on
LITERATURE REVIEW OUTLINE EXAMPLE ONLY
Get a plagiarism free paperJust from $13/Page
Order Essay
  1. Introduction
  2. Thesis Statement – The purpose of this Capstone Proposal is to determine whether

authentication protocols increase the protection of personal information.

  1. Internet Safety- Are we really safe?
  2. Passwords, two-factor authentication, biometrics, security questions are the many ways

out there to protect our data while on the internet.

  1. Are these protocols enough to protect us from cybercriminals?
  2. Brief History of the Internet and Cybersecurity
  3. Overview of characteristics of the theme (commonalities, differences)
  4. Birth of the Internet –
  5. How did the internet become what it is today?
  6. Why was it created?

iii. How is the internet dangerous in today’s world?

  1. Sources –
  2. McQuade, S. C., III. (2009). Encyclopedia of Cybercrime. Westport, CT:

Greenwood Press. Retrieved April 6, 2019, from http://

sirsi.immaculata.edu/uhtbin/cgisirsi.exe/?ps=EDx5SbpSx7/SIRSI/X/5/0#

  1. Merkow, M. S., & Breithaupt, J. (2000). The Complete Guide to Internet

Security. New York: AMACOM. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=41882&site=ehost-live

  1. CERN. (2018). NSF and the Birth of the Internet – Special Report | NSF –

National Science Foundation. Retrieved from https://www.nsf.gov/news/

special_reports/nsf-net/textonly/90s.jsp

  1. ARPANET –
  2. What is ARPANET?
  3. How does it pertain to the internet today?

iii. Why was the government using it?

  1. Sources –
  2. McQuade, S. C., III. (2009). Encyclopedia of Cybercrime. Westport, CT:

Greenwood Press. Retrieved April 6, 2019, from http://

sirsi.immaculata.edu/uhtbin/cgisirsi.exe/?ps=EDx5SbpSx7/SIRSI/X/5/0#

  1. Hackers on the Rise
  2. What is the difference between white hat and black hat?
  3. What are the characteristics of each?

iii. Why are they important?

  1. Sources –
  2. Claypoole, T., Swecker, C., & Payton, T. (2011). Protecting Your Internet

Identity: Are You Naked Online? Lanham: Rowman & Littlefield

Publishers. Retrieved from http://library.immaculata.edu:2052/

login.aspx?direct=true&db=e000xna&AN=439157&site=ehost-live

  1. Merkow, M. S., & Breithaupt, J. (2000). The Complete Guide to Internet

Security. New York: AMACOM. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=41882&site=ehost-liveCommon Threats

  1. Litchfield, D. (2007). The Oracle Hacker’s Handbook: Hacking and

Defending Oracle. Indianapolis, IN: Wiley. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=190582&site=ehost-live

  1. Malware
  2. What is Malware?
  3. How do they affect our safety on the internet?

iii. When was the first virus created?

  1. Sources –
  2. Brunton, F. (2013). Spam: A Shadow History of the Internet. Cambridge,

Massachusetts: The MIT Press. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=562440&site=ehost-live

  1. Borrelli, M. (2013). Malware and Computer Security Incidents: Handling

Guides. New York: Nova Science Publishers, Inc.

  1. Social Engineering
  2. What is social engineering?
  3. What are the steps to take to prevent it?

iii. How is it used with authentication protocols?

  1. What is Spoofing?
  2. Sources –
  3. McQuade, S. C., III. (2009). Encyclopedia of Cybercrime. Westport, CT:

Greenwood Press. Retrieved April 6, 2019, from http://

sirsi.immaculata.edu/uhtbin/cgisirsi.exe/?ps=EDx5SbpSx7/SIRSI/X/5/0#

  1. Merkow, M. S., & Breithaupt, J. (2000). The Complete Guide to Internet

Security. New York: AMACOM. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=41882&site=ehost-liveSpoofing

  1. Claypoole, T., Swecker, C., & Payton, T. (2011). Protecting Your Internet

Identity: Are You Naked Online? Lanham: Rowman & Littlefield

Publishers. Retrieved from http://library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=439157&site=ehost-live

III. Cybersecurity Education

  1. NICE/NIST
  2. How do these guides help?
  3. Are they readily available to the public?

iii. Why are they not being taught in schools?

  1. Sources –
  2. Sutton, D. (2017). Cyber Security: A Practitioner’s Guide. Swindon, UK:

BCS, The Chartered Institute for IT. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=1501522&site=ehost-live

  1. Joint Task Force. (2018, December). Risk Management Framework for

Information Systems and Organizations A System Life Cycle Approach

for Security and Privacy. Retrieved from https://doi.org/10.6028/

NIST.SP.800-37r2

  1. Internet Etiquette
  2. What are the basic rules for the internet?
  3. Why should we follow them?

iii. Are they useful in today’s society?

  1. Sources –
  2. Engard, B. (2018, November 14). The New Netiquette: Internet Etiquette

in a Modern World. Retrieved from https://online.jefferson.edu/

communications/new-netiquette/

  1. Authentication Protocols
  2. Passwords and Security Questions
  3. When did passwords start?
  4. Why are passwords used?

iii. How can passwords and security questions be updated?

  1. Sources –
  2. Sutton, D. (2017). Cyber Security: A Practitioner’s Guide. Swindon, UK:

BCS, The Chartered Institute for IT. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=1501522&site=ehost-live

  1. Two-Factor Authentication
  2. What is the difference between passwords and two-factor?
  3. Are they safer?

iii. How can they be used to protect PII?

  1. Sources –
  2. Burnett, M., & Kleiman, D. (2006). Perfect Password: Selection,

Protection, Authentication. Rockland, Mass: Syngress. Retrieved from

http://library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=149590&site=ehost-live

  1. Biometrics
  2. What type of biometrics are being used today?
  3. Is biometrics safer to use than passwords?

iii. Can biometrics be hacked?

  1. Sources –
  2. Vacca, J. R. (2007). Biometric Technologies and Verification Systems.

Amsterdam: Butterworth-Heinemann. Retrieved from http://

library.immaculata.edu:2052/login.aspx?

direct=true&db=e000xna&AN=320816&site=ehost-live

  1. Conclusion:
  2. What are the contributions of these literature to the field?
  3. They provide an overall view of cybersecurity and allow the reader an in-depth

look into the how to to protect themselves from the many attacks that are

constantly occurring on the internet.

  1. What are the overall strengths?
  2. Wide range of books related to cybersecurity.
  3. Government articles on infrastructure and internet safety.
  4. What are the overall weaknesses?
  5. Hard to find peer reviewed articles for this related field. Many are only books.
  6. There isn’t enough research on cybersecurity.
  7. What might be missing?
  8. Need to find more appropriate sources for this field.
  9. There is a lack of researched topics related to cybersecurity. Specifically the

subject of authentication protocols.

  1. What are some next steps for research? The next steps should explicitly address how to

“correct” for strengths, weaknesses, and gaps.

  1. There might be a need to widen my research topic to find credible sources.
  2. Look for peer-reviewed sources regarding cybersecurity as a whole.

iii. See if there are any articles pertaining to authentication methods and protocols.

At this point, no luck with the search

Homework Valley
Calculate your paper price
Pages (550 words)
Approximate price: -

Our Advantages

Plagiarism Free Papers

All our papers are original and written from scratch. We will email you a plagiarism report alongside your completed paper once done.

Free Revisions

All papers are submitted ahead of time. We do this to allow you time to point out any area you would need revision on, and help you for free.

Title-page

A title page preceeds all your paper content. Here, you put all your personal information and this we give out for free.

Bibliography

Without a reference/bibliography page, any academic paper is incomplete and doesnt qualify for grading. We also offer this for free.

Originality & Security

At Homework Valley, we take confidentiality seriously and all your personal information is stored safely and do not share it with third parties for any reasons whatsoever. Our work is original and we send plagiarism reports alongside every paper.

24/7 Customer Support

Our agents are online 24/7. Feel free to contact us through email or talk to our live agents.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

We work around the clock to see best customer experience.

Pricing

Flexible Pricing

Our prices are pocket friendly and you can do partial payments. When that is not enough, we have a free enquiry service.

Communication

Admission help & Client-Writer Contact

When you need to elaborate something further to your writer, we provide that button.

Deadlines

Paper Submission

We take deadlines seriously and our papers are submitted ahead of time. We are happy to assist you in case of any adjustments needed.

Reviews

Customer Feedback

Your feedback, good or bad is of great concern to us and we take it very seriously. We are, therefore, constantly adjusting our policies to ensure best customer/writer experience.