To write a proposal, you need to attention to the

 To write a proposal, you need to attention to the following points: Generally, start with an overview or a background about the problem that you want to solve. But before writing a background, you need to understand the problem then try to find an answer or a solution for that. Background: Security issues in eCommerce are causing a lot of damage to businesses such as financial and their reputation. the attacks on e-commerce website are gowning gradually for more that 30% of the total e-commerce websites from small to large businesses. So, the first step would be:  Step-1: Finding a problem (what is the function of the writing the proposal)We need to have a problem then we can suggest various ways to answers it or suggest a method to resolve the issue. In this case, you need to answer, <What do you want to do?> that means <What is the problem that you want to solve it?> for example, we have a security problem on client-server architecture based on E-commerce structure, such as the security and privacy of online transactions, including

  • Denial of Service, (DoS) 
  • Unauthorized access,
  • Malicious Alterations to websites,
  • Theft of customer information, 
  • Damage to computer networks,
  • Creation of counterfeit sites. 

Step-2: Method and SolutionWe need to focus on the problem and find a solution or a way to answer to the problem, that means <How do you want to do your project?>for example, my method is to design a secure client and server architecture, so we can create or use an exiting model then find a solution for the above problems and how to minimize the vulnerability of this structure. That means to find a solution for each part of the problem.for example, in terms of DoS, the attackers stop authorized users from accessing a website, resulting in reduced functioning of the website.How the attackers doing DoS, or what’s the type of DoS attacks? the DoS attacks are based on Network, Protocol, Storage, Processor,…. We can consider using a password management, password encryption techniques, using multi-factor authentication, using security questions, creating a uniquid accessing for each device.In case of secure network, all we want to stop <zombie machines> or <devices> to access or make a requests to a service. then, we need to think about each DoS simulation and the method (for example in the network layer) that we want to work on it. Step-3: Result and Analysis and outcome expectationAt this stage, we want to know <what would be the outcomes>, and <how we can validate/test the results>? So I expect to see your proposal that can present a problem and be able to write the answer to above questions and above steps in any format. You can write or make a flowchart and/or demonstrate step-by-step work actions, also creating a job duties for each member (optional). 

Part 1: Write the proposal

Part 2: Write the code for the above proposal

Part 3: Execution 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

315 solve 3 Nursing Assignment Help

Expert Solution Preview Introduction: As a medical professor in charge of creating assignments and evaluating student performance for medical college students, I aim to provide a comprehensive and accurate response to the given content. Drawing upon my experience and expertise, I will answer the question based on the provided information.

Burnout of Advanced Practice Providers Liuterature Review Nursing Assignment Help

General Problem Statement The general problem to be addressed is the burnout of Advanced Practice Providers (APP) or Mid-Level Providers as members of the United States health care system.  Expert Solution Preview Introduction: Burnout among Advanced Practice Providers (APP) or Mid-Level Providers is a significant concern within the United States

Response Comments – After posting your initial response to the

Response Comments – After posting your initial response to the question, begin making comments to your peers. A minimum of two comments made on two different days must be posted in the discussion for a passing grade.  The comments must be early enough before the end of the week to allow

Submission Instructions Write 500 words (+ 50 words) using APA

  Submission Instructions Write 500 words (+ 50 words) using APA style format to answer each of the following questions: six exercises worth 5% each, posted in their corresponding . Each report should comprise of an introduction, analysis, and a clear conclusion.   Unit Exercise 3 On successful completion of

Purpose This assignment is intended to help you learn how

  Purpose  This assignment is intended to help you learn how to apply statistical methods when analyzing operational data, evaluating the performance of current marketing strategies, and recommending actionable business decisions. This is an opportunity to build critical-thinking and problem-solving skills within the context of data analysis and interpretation. You’ll

International Negotiations Plan

 International Negotiations Plan WRITER: You will apply all of the skills you learned to create an international negotiation plan. You have been asked by your supervisor to create a proposal for negotiating the sale of your product with a Japanese company. You know that Japanese business practices may be different

Imagine visiting overseas, where you win the local lottery and

Imagine visiting overseas, where you win the local lottery and can buy any foreign car you wish and will pay full retail price using the local currency, payable in three months. You have determined that you have enough cash at your bank in New York City, which pays 0.35 percent

Read “Narrative Techniques” in this week’s readings to learn techniques

 Read “Narrative Techniques” in this week’s readings to learn techniques and strategies writers use to create a vibrant scene. Then read and annotate the student sample narrative below for all of the narrative techniques.  Annotating a text is a vital literate practice for critical reading as it helps you achieve a deeper,

Module 05 Content As a portion of security compliance, one

  Module 05 Content As a portion of security compliance, one of the board members used SANS security controls at a former business and was very pleased with its outcomes. Based on this knowledge and to meet the needs of the board members, you have decided on implementing a few

Epigenetics video – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

This week you learned about the importance of adopting a

This week you learned about the importance of adopting a growth mindset vs. a fixed mindset. Describe a time in your life when you faced an important opportunity or challenge with a fixed mindset? What held you back? Were you concerned about your ability to succeed? Were you worried about

Consider the lesson plan you are developing and select a

 Consider the lesson plan you are developing and select a vocabulary word you are planning to introduce to your students. Develop an activity that will help your students build further understanding and application of the vocabulary word. While you are free to gather ideas from other activities, your submission must

European Old and New Worlds Purpose and Outcomes Now that

  European Old and New Worlds Purpose and Outcomes Now that we have expanded our understanding of the terms Old and New Worlds in a Native American context, let’s examine those ideas from a European perspective. Instructions Please provide a 150-word minimum response to the following question. Your response is

Go to the website using this link:

Go to the website using this link: Click the Play button to start the game. Follow the instructions. They will lead you on a search for an infected organism. Once you have found the infected organism, write a three- to four-page review of the process you went through and the

How do antibiotics work? Antibiotics work through the concept of

Antibiotics, sometimes known as antibacterials, are drugs that either kill bacteria or stop their growth. Alexander Fleming discovered the first antibiotic – penicillin – in the 1920s. Penicillin was used for the first time during World War II. “Of all the weapons developed during World War II, penicillin was probably the most

Solve one of the following Learning Exercises from Marquis and

    Solve one of the following Learning Exercises from Marquis and Huston’s Leadership Roles and Management Functions in Nursing, 10th edition.  •Learning Exercise 4.2 (page 92) •Learning Exercise 4.7 (page 104) •Learning Exercise 4.10 (page 106) •Learning Exercise 5.2 (page 116) •Learning Exercise 5.8 (page 132) •Learning Exercise 5.9 (page

Malicious individuals have discovered several methods to attack and defeat

  Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems. Identify one cryptographic attack and how you can protect against it.  Provide an outside source (for example, an article from the UC Library) that