Further analyze research in system and application security protection mechanisms. Then evaluate best practices in system and application security. Combine your topic definition, literature review, and methodology work into a draft of your project.
. Your draft should meet the following requirements:
- The introduction contains a concise thesis and organizational plan, including only what is necessary to present the thesis and plan of the paper.
- The body of the paper relates to the thesis, is adequately developed, and is logically structured.
- Primary and secondary sources are integrated only as necessary to develop your argument.
- The following elements are included:
- An assessment on how the data in your research would be analyzed.
- An analysis of which software tools and tests can be used.
- An analysis of the benefits and costs of system and application security.
- An analysis of emerging research in system and application security protection mechanisms.
- Quotations are properly integrated and concise, relating only what is necessary to make a point.
- Evaluative information is presented logically, adhering to APA and course specifications and relating clearly to your thesis or argument.
- The conclusion is concise and effectively includes one or more of the following:
- Synthesis of information.
- Course of action.
- Broader implications.
- Significance of the study.
- Connections to related issues.
- Recommendations.
- Literature is properly cited and referenced in current APA format.