CSP600 Proposal Template
CSP600 Proposal Template
CSP600 Proposal Template
May 2019
TABLE OF CONTENT
TABLE OF CONTENT
CONTENTS PAGE
TABLE OF CONTENT i
LIST OF FIGURES ii
LIST OF TABLES iii
CHAPTER ONE: INTRODUCTION 1
1.1 Background of Study 1
1.2 Problem Statement 1
1.3 Project Aim 1
1.4 Project Objectives 1
1.5 Project Scope 1
1.6 Project Significance 1
1.7 Outline of the Thesis 1
1.8 Summary 1
CHAPTER TWO: LITERATURE REVIEW 2
2.1 Topic 2.1 2
2.1.1 Topic 2.1.1 3
2.1.2 Topic 2.1.2 3
2.2 Topic 2.2 3
2.2.1 Topic 2.2.1 3
2.2.2 Topic 2.2.2 3
2.3 Summary 3
CHAPTER THREE: METHODOLOGY 4
3.1 Topic 3.1 4
3.2 Topic 3.1 4
3.3 Summary 4
REFERENCE 5
APPENDICES 6
1
LIST OF FIGURES
LIST OF FIGURES
FIGURE PAGE
2
LIST OF TABLES
LIST OF TABLES
TABLE PAGE
3
1 CHAPTER 1
CHAPTER ONE: INTRODUCTION
2 Introduction
INTRODUCTION
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x
2.8 Summary
1
CHAPTER 2
CHAPTER TWO: LITERATURE REVIEW
3 Literature Review
LITERATURE REVIEW
This chapter provides current finding sources that related to Remote Intrusion
Detection Management System. The chapter would elaborate more on types of
intrusion detection system, system platform, operating system, network model, and
related works. This chapter also would explain the process involved that used in the
project such as threat logging, secure command transmission, and threat
countermeasure.
This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
2
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter
blah2x This chapter blah2x This chapter blah2x This chapter blah2x This
chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x
3.3 Summary
3
CHAPTER 3
CHAPTER THREE: METHODOLOGY
4 Methodology
METHODOLOGY
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x This chapter blah2x This chapter blah2x
This chapter blah2x This chapter blah2x
4.3 Summary
4
REFERENCES
REFERENCE
5
APPENDICES
APPENDICES