0% found this document useful (1 vote)
1K views10 pages

CSP600 Proposal Template

This document outlines the proposal for a final year project on studying the awareness of privacy issues on the internet. It includes an introduction discussing the background, problem statement, aims, objectives and scope. It also includes sections on the literature review and methodology. The literature review discusses intrusion detection systems, related topics and a comparison table. The methodology section describes the overall approach but does not provide details. Tables of contents and figures are included.

Uploaded by

Syahid Farhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
1K views10 pages

CSP600 Proposal Template

This document outlines the proposal for a final year project on studying the awareness of privacy issues on the internet. It includes an introduction discussing the background, problem statement, aims, objectives and scope. It also includes sections on the literature review and methodology. The literature review discusses intrusion detection systems, related topics and a comparison table. The methodology section describes the overall approach but does not provide details. Tables of contents and figures are included.

Uploaded by

Syahid Farhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Supervisor/Examiner

Universiti Teknologi MARA

The Awareness of Privacy Issues on


Internet

Mohd Hanas Husin

Final Year Project Proposal


Bachelor of Information Technology (Hons.)
Information Systems Engineering
Faculty of Computer and Mathematical
Sciences

May 2019
TABLE OF CONTENT
TABLE OF CONTENT

CONTENTS PAGE

TABLE OF CONTENT i
LIST OF FIGURES ii
LIST OF TABLES iii
CHAPTER ONE: INTRODUCTION 1
1.1 Background of Study 1
1.2 Problem Statement 1
1.3 Project Aim 1
1.4 Project Objectives 1
1.5 Project Scope 1
1.6 Project Significance 1
1.7 Outline of the Thesis 1
1.8 Summary 1
CHAPTER TWO: LITERATURE REVIEW 2
2.1 Topic 2.1 2
2.1.1 Topic 2.1.1 3
2.1.2 Topic 2.1.2 3
2.2 Topic 2.2 3
2.2.1 Topic 2.2.1 3
2.2.2 Topic 2.2.2 3
2.3 Summary 3
CHAPTER THREE: METHODOLOGY 4
3.1 Topic 3.1 4
3.2 Topic 3.1 4
3.3 Summary 4
REFERENCE 5
APPENDICES 6

1
LIST OF FIGURES
LIST OF FIGURES

FIGURE PAGE

Figure 2.1 Waterfall Model Revised 2

2
LIST OF TABLES
LIST OF TABLES

TABLE PAGE

Table 2.1 Comparison of Different Systems 3

3
1 CHAPTER 1
CHAPTER ONE: INTRODUCTION
2 Introduction
INTRODUCTION

This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x

2.1 Background of Study

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

2.2 Problem Statement

2.3 Project Aim

2.4 Project Objectives

2.5 Project Scope

2.6 Project Significance

2.7 Outline of the Proposal

2.8 Summary

1
CHAPTER 2
CHAPTER TWO: LITERATURE REVIEW
3 Literature Review
LITERATURE REVIEW

This chapter provides current finding sources that related to Remote Intrusion
Detection Management System. The chapter would elaborate more on types of
intrusion detection system, system platform, operating system, network model, and
related works. This chapter also would explain the process involved that used in the
project such as threat logging, secure command transmission, and threat
countermeasure.

3.1 Intrusion Detection System

In these industrial revolution days, network security has become a part of


vital infrastructure that has to be keen hardened. A system suchlike Intrusion
Detection System (IDS) is acquired to ensure any malicious attempt can be
intercept before any further malicious activity can be done by intruder.

Figure 2.1 Waterfall Model Revised

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This

2
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

3.1.1 Topic 2.1.1

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

Table 2.1 Comparison of Different Systems

Criteria 1 Criteria 2 Criteria 3


System A
System B
System C

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

3.1.2 Topic 2.1.2

3.1.2.1 Topic 2.1.2.1

3.2 Topic 2.2

3.2.1 Topic 2.2.1

3.2.2 Topic 2.2.2

3.3 Summary

3
CHAPTER 3
CHAPTER THREE: METHODOLOGY
4 Methodology
METHODOLOGY

This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x

4.1 Topic 3.1

4.2 Topic 3.1

4.3 Summary

4
REFERENCES
REFERENCE

5
APPENDICES
APPENDICES

You might also like