Sie sind auf Seite 1von 10

Supervisor/Examiner

Universiti Teknologi MARA

The Awareness of Privacy Issues on


Internet

Mohd Hanas Husin

Final Year Project Proposal


Bachelor of Information Technology (Hons.)
Information Systems Engineering
Faculty of Computer and Mathematical
Sciences

May 2019
TABLE OF CONTENT
TABLE OF CONTENT

CONTENTS PAGE

TABLE OF CONTENT i
LIST OF FIGURES ii
LIST OF TABLES iii
CHAPTER ONE: INTRODUCTION 1
1.1 Background of Study 1
1.2 Problem Statement 1
1.3 Project Aim 1
1.4 Project Objectives 1
1.5 Project Scope 1
1.6 Project Significance 1
1.7 Outline of the Thesis 1
1.8 Summary 1
CHAPTER TWO: LITERATURE REVIEW 2
2.1 Topic 2.1 2
2.1.1 Topic 2.1.1 3
2.1.2 Topic 2.1.2 3
2.2 Topic 2.2 3
2.2.1 Topic 2.2.1 3
2.2.2 Topic 2.2.2 3
2.3 Summary 3
CHAPTER THREE: METHODOLOGY 4
3.1 Topic 3.1 4
3.2 Topic 3.1 4
3.3 Summary 4
REFERENCE 5
APPENDICES 6

1
LIST OF FIGURES
LIST OF FIGURES

FIGURE PAGE

Figure 2.1 Waterfall Model Revised 2

2
LIST OF TABLES
LIST OF TABLES

TABLE PAGE

Table 2.1 Comparison of Different Systems 3

3
1 CHAPTER 1
CHAPTER ONE: INTRODUCTION
2 Introduction
INTRODUCTION

This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x

2.1 Background of Study

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

2.2 Problem Statement

2.3 Project Aim

2.4 Project Objectives

2.5 Project Scope

2.6 Project Significance

2.7 Outline of the Proposal

2.8 Summary

1
CHAPTER 2
CHAPTER TWO: LITERATURE REVIEW
3 Literature Review
LITERATURE REVIEW

This chapter provides current finding sources that related to Remote Intrusion
Detection Management System. The chapter would elaborate more on types of
intrusion detection system, system platform, operating system, network model, and
related works. This chapter also would explain the process involved that used in the
project such as threat logging, secure command transmission, and threat
countermeasure.

3.1 Intrusion Detection System

In these industrial revolution days, network security has become a part of


vital infrastructure that has to be keen hardened. A system suchlike Intrusion
Detection System (IDS) is acquired to ensure any malicious attempt can be
intercept before any further malicious activity can be done by intruder.

Figure 2.1 Waterfall Model Revised

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This

2
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

3.1.1 Topic 2.1.1

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

Table 2.1 Comparison of Different Systems

Criteria 1 Criteria 2 Criteria 3


System A
System B
System C

This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x

3.1.2 Topic 2.1.2

3.1.2.1 Topic 2.1.2.1

3.2 Topic 2.2

3.2.1 Topic 2.2.1

3.2.2 Topic 2.2.2

3.3 Summary

3
CHAPTER 3
CHAPTER THREE: METHODOLOGY
4 Methodology
METHODOLOGY

This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x

4.1 Topic 3.1

4.2 Topic 3.1

4.3 Summary

4
REFERENCES
REFERENCE

5
APPENDICES
APPENDICES

Das könnte Ihnen auch gefallen