Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Development of a framework for security personal identification against emerging cybersecurity threats Requirements: 1. Make a methodology document on the topic 2. Use a qualitative method 3. Include...

1 answer below »
Development of a framework for security personal identification against emerging cybersecurity threats
Requirements:
1. Make a methodology document on the topic
2. Use a qualitative method
3. Include 40 references
4. Describe methods of analysis
5. Advantages and disadvantages of methodologies for the topic
6.Survey online resources
Answered Same Day May 27, 2021

Solution

Kshitij answered on May 27 2021
143 Votes
Development of a framework for security personal identification against emerging cybersecurity threats
The method of qualitative research can be explained as the different market research that can be user to survey the market and to gather the market data [2]. This is also known as the conventional communication and also the open-ended communication [29]. This communication is all about what the people think so for the particular agreement [21]. It is very important for all user to protect them self from the emerging cybersecurity threats while doing any task [4]. The people who are facing the issue can be analysed by taking the account them into the online interview and survey, these interviews are been conducted on the potentials users who are facing this high threat issue [6].
During the research study of the topic various material and research paper are been analysed to find out the root cause of the problem so that the emerging cybersecurity threats cannot attack the user while doing any task [30]. The paper that are analysed for the topic of emerging cybersecurity threats are based on the qualitative research [1]. The problem statement is defined in the paper that are been summarised in the papers [5]. The most common problem that are been analysed in the paper while study are as follows:
· Lack of the server[13].
· Denial of Service attack [18].
· The unwanted link that they receive from unknown company.
· Leak of database from client side [20].
The qualitative research approach help the user to get the actual data about the given scenario and by the given database they can predict the actual size meta data [15]. The data that is been gathered from this research methodology is the real time data [25]. The text analyses is also been an different analysis user method that is been used for the user gathering experience by which they can gather out the social life of the user or customers. The social life of the person predict the whole given scenario of the user by taking the action into the real world [17]. This data is been gather from different website of the user take interest like Facebook, Twitter etc. The that is been gathered from this social analyse is the real time data and the file that are gather is based on the given location [16]. The are defined in the social text analyses. The pros and cons for the text analyse are as follows:
Pros:
1. The information that are gather are real time information.
2. The information that is gather are location based with the fixed number of users.
3. The information that are extracted are free from e
or [9].
Cons
1. The sample size is not defined in the analyses part.
2. The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here