The purpose of this proposal is to request a study and analyze the
implementation and eventual widespread use of XYZ technology to prevent
network intrusions …or whatever.
Summary
Last month, Mr. John Biggie asked me to explore the possibilities of doing whatever…..
Small
Technologies has a series of problems in network security that must me
addressed. Be specific about the problems the company has.
To
perform the research and technical testing required I estimate
approximately 40-50 hours over the next six weeks. I will research and
explore the problem and provide a progress report in three weeks and the
final report in six weeks. This time table will give us time to
research and implement proper procedures.
Introduction
Give your spiel here about the problem. This should be a couple of paragraphs…and the meat of the proposal.
Tasks
In order to solve the problem and….. I am proposing that these tasks be completed:
You
should have at least four tasks to complete for the final project. You
also should add a sentence or so with each task. So, please do not
write, investigate the financial issues. Be a little more specific.
Task 1:
Task 2:
Task 3:
Task 4:
Schedule: A graph/timeline works well for this
Budget
You need to include a budget. Be specific and be realistic.
Experience
I
am a certified (fill in something about your background here. Show
(don’t tell) why you are the right person for this consulting job.
References
You
need at least three possible references. Use of a technical textbook
does not count as a reference. You must include an article from a
professional journal that you found using UMUC library database (that is
a UMUC requirement). You could use a potential interview.
Closing remarks
I look forward to working with you…if you have questions………
Thursday, 13 July 2017
CYBER WARRIOR’S USE OF SOCIAL MEDIA SITE TO GAIN INFORMATION The purpose of this proposal is to request a study and analyze the implementation and eventual widespread use of XYZ technology to prevent network intrusions …or whatever. Summary Last month, Mr. John Biggie asked me to explore the possibilities of doing whatever….. Small Technologies has a series of problems in network security that must me addressed. Be specific about the problems the company has. To perform the research and technical testing required I estimate approximately 40-50 hours over the next six weeks. I will research and explore the problem and provide a progress report in three weeks and the final report in six weeks. This time table will give us time to research and implement proper procedures.
Subscribe to:
Post Comments (Atom)
One of the distinguishing features in the earlier films is the presence of video cameras and their low-resolution images that contrast with film images that seem more stable and permanent
The goal of the project is to have you research a movie of your choice (cannot be a film shown in class whic...
-
Environmental Justice Toxins in the environment are a common health risk, but they are not always obvious or easy to identify. The trained...
-
this is a case study on financial accounting. attached are two files. one is the questions that are to be answered and the other document is...
-
Psychology students need the ability to create informed consent and debriefing forms that adequately state t...
No comments:
Post a Comment