You are on page 1of 7

PROJECT PROPOSAL

MASTER IN COMPUTER SCIENCE (INFORMATION SECURITY)

TITLE OF PROJECT
YOUR CHOSEN PROJECT TOPIC

Prepared by:
Your Name
(metric card number)

Supervisor
Supervisors name

Date:
99/99/9999

Sample Proposal

TABLE OF CONTENTS

CONTENTS
1.0

PAGE

Introduction.9
1.1

Background of the problem 9

1.2

Problem Statement..9

1.3

Project Aim. 9

1.4

Project Objectives9

1.5

Project Scope9

2.0

Literature Review ... 9

3.0

Methodology .. 9

4.0

Expected Outcome . 9

5.0

Conclusion.. 9
References.. 9
Gantt Chart.. 9

Sample Proposal

1.0

Introduction
Introduce the reader to the area in which you will be working. This includes basic

definitions and explanations geared towards your area of interest.

Current

statistics

depicting trends to real situations are acceptable.


Examples of introduction:
Example 1:
Developments in Information and Communication Technologies (ICTs) have impacted all
sectors such To ensure effective working of information security, various controls
and measures had been implemented .. However, lack of proper .. Undoubtedly, the
most important of these controls is the Hence, this project examines.
Example 2:
A wireless local area network is .
WLAN have gained popularity.. The emphasis is This project is concerned about
security issues. However, this project will only focus on which .
Example 3:
An access control is . However, human authentication is the security task. However,
. A more practical approach is to. This project implements . by using .

1.1

Background of the Problem

Proceed to describe what sort of work has already been done and exactly what you
propose to do, going into as much detail as possible. Indicate the technical importance
and/ or interest of your proposed work. In discussing previous work you should cite
references gathered in a literature search including critiques and summaries of the
references read and cited.

Sample Proposal
1.2

Problem Statement

Examples of problem statement:


Example 1:
A review on the list of journal listed in .. This shown that there is no research
had been conducted for other aspect of ..
As the is responsible for preparing the This will provide some assurance that
the universitys resources will be taken care and effectively protected. Hence, a study
on the . with regards to .. is needed due to lack of empirical study on this area.
Example 2:
Wireless environment is not restricted to. Many researches carried out to. However,
not all of them are effective In contrast, the proposed project is a .
Example 3:
Statistics showed that there is an urgent need to protect multimedia content. The
estimated trade loss was. Thus to reduce the impact of threats security awareness is
extremely important in

1.3

Project Aim

Example 1:
The aim of this study is to investigate and examine ..
Example 2:
The aim is to make the client and the machine authentication .
Example 3:
The aim is to have a Malaysian Law Enforcement policy and procedure in handling
digital evidence for cyber crime cases .

Sample Proposal

1.4

Project Objectives
It is recommended you have only three (3) objectives for your project.

Some examples for Objective One:

To investigate the

To determine the .

To examine the .

To identify .

Some examples for Objective two:

To design..

To compare

To enhance.

To integrate.

To automate

Some examples for Objective Three:

1.5

To measure

To evaluate

Project Scope

The scope for this study focuses on..

A laboratory-based project. Laptop To prepare a project paper, to surf internet


valuable materials or references and to execute test of analysis.

Will address investigation steps on major phases of digital evidences.

Interview To understand and to have richer explanation on ..

Sample Proposal

Develop Questionnaires and conduct a survey To obtain feedback from IT


management and operational employee.

Conducting interviews with selected .

Software requirements MPLAB IDE.

Use Statistical software To perform data analysis including solutions for Data
Integration, Analytics and Business Intelligence i.e. SAS Statistical Analysis
ver or Amos ver.

2.0

Literature Review
The literature review discuses several basic knowledge. Review past researches
which explore issues, theories found in scholarly writings and provides
explanations, summary and critical evaluation on related works done.

3.0

Methodology
How the research is going to be executed?
Develop prototype / Simulation / Survey/ Interview / Focus Group/ Mixed Method

4.0

Expected Outcome
Examples
Model / Framework / Instrument / Prototype / Measurement / Questionnaire

5.0

Conclusion
ICT provides great opportunity However, lack of security control would

impede . in meeting the objectives. Failure to have a comprehensive may put the
exposed to threats. Additionally, the . Therefore, there is a need for ..

Sample Proposal

References

(refer

to Theses Manual-July, 2007 for

details, found from

www.sps.utm.my)

Either use
Harvard System (Author and Year system)
Examples
Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2010b). Resolved-Acceleration Control of
Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474.
Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice Hall
International Ltd.

Or use
Number System
[1] Soderstrom, T., and Stoica, P. (2005). System Identification. United Kingdom: Prentice
Hall International Ltd.
[2] Luh, J. Y. S., Walker, M. W., and Paul, R. P. (2008b). Resolved-Acceleration Control of
Mechanical Manipulators. IEEE Trans. Automatic Control. 25(3): 468-474.

Appendix: Gantt Chart

You might also like