Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Topic: Find at least cyber threats (exception software of Wireshark and nmap). R

ID: 3586557 • Letter: T

Question

Topic: Find at least cyber threats (exception software of Wireshark and nmap). Requirement for the part 2 of Testl 10 software that can monitor Network Traffic, which helps detect You need write Methods section for the topic The Methods Section 1. . The Methods section is the portion of the manuscript in which you outline how you performed your study. In many cases, the Methods section is the most important portion of the manuscript because poor methodology can only lead to results that are suspect, thereby seriously impairing the credibility of the manuscript. On the other hand, if the methods are scientifically sound, even uninteresting results can have merit. Readers will judge the reliability, validity or trustworthiness of the o o study by this section. The method section answers two main questions: How was the data collected or generated? How was the data analyzed? Introduce the overall methodological approach for investigating your research problem. o Is your study qualitative or quantitative or a combination of both (mixed method)? Did you take a special approach, such as ethnography, action research, or a more positivistic stance? Indicate how the approach fits the overall research design. Your methods should have a clear connection with your research problem. In other words, make sure that your o methods actually address the problem. One of the most common deficiencies found in research articles is that the proposed methodology is unsuited to achieving the stated objective of your paper. Provide background and rationale for methodologies that are unfamiliar for your readers. Be clear and concise in your explanation. This information is particularly important when a new method has been developed or an innovative use of an existing method has been utilized. Data collection: Describe clearly the specific methods of data collection that was used, such as, surveys, interviews, questionnaires, observation, archival research Participant selection and sampling procedures: Provide a rationale for subject selection and sampling procedures. For instance if interviews were conducted, how was the study sample selected? If texts were analyzed, how were the texts chosen, and why? If using statistics, why is this set of statistics being used? If other data sources exist, explain why the data you chose is most appropriate. Data analysis: Explain how the findings were analyzed. Whether statistical analysis was used or specific theoretical perspectives to help analyze text or observations? If analysis was done of existing data, such as a data set or archival documents, describe how these were originally created or gathered and by whom. ·

Explanation / Answer

The threat compaines can be safeguard against the internet
security is malware.
by using malicious software can monitor the activity,acess personal
data and creaye backdoors.
backdoor lead to large scale atacks we called as data breaches.
Firewall helps to protect the plans in place and
reduce threats.
antivirus also protect the malware infected by computer.
data loss can be stop by monitor vendors and contracttors.
backup data helps in emerging attacks.
Beware from tactis it will encrypt the data files.