Sunteți pe pagina 1din 1

GiftedandTalentedProgram

ProductAbstract
Eachstudentinthe IndependentResearchProgrammustcarryoutan authentic,advanced research, whichiscapableofevaluatingits
quality, authenticity,and novelty. The following information, written by thestudent, provides anoverview of theprojectproposalas
planned.

Student:
ArjunJale

Date:
June8,2016
Research Title:
Why HackersUseVirusestoElevateTheirStatusinThe GlobalEconomy,EvolutionofTheUseoftheViruses,And
HowtoStopThem.
Purpose:
To find a reasonable way to increase cyberthreat awarenessin adolescents andadults. Toexamine root causes of cyber
negligence.Toenlightenstudentsonthedangersofcyberattacksandthebenefitsoflearningcyberdefenseinthefuture.
Expected Product or Outcomes:
Scholarly discussion about the threat of cyber attack in the modern era. Discussion will include
overview oftopic,data collectionresults, andthreatanalysisdatafromInternationalBusinessMachines(IBM).This presentationwill
teststudentsoncontentlearnedwithscenariosandenforcetheideaofcautionontheinternet.
Noveltyof Project:
Many students andadults donotunderstandtherisksoftheinternetandtheneed forcyberdefense. Adolescents
and Young Adults do not possess the maturity to comprehend the true dangers ofcyber attacks. By introducing the dangers of the
internet, they are able to selfreflect on theircurrentactions.Ratherthan forceachangewithinthegroup,thisprojectis uniqueinthat
itallowsindividualstoreflectoncurrenthabits,anditallowsthemtorepenttheirhabitsforthefuture.
ProcedureorMethod:
StepsTakentoCompletetheProjectasof6/10/16.

1. Read scholarly journals throughonlinedatabases,specificallydetailingtheimplications ofphishingandagegroupsthatwere


vulnerabletophishingattacks.
2. Form a topic fusingcyberdefense withCybersecurityImplications.Inthiscontext:Howtodefendagainst cyberattackswith
astrongcyberdefense.
3. Secureanadvisor(s):Dr.JohnPinkston,aprofessorattheUniversityofMaryland,BaltimoreCounty.
4. Conduct interviewswith professors,includingDr.JohnPinkston(UniversityofMaryland,BaltimoreCounty),and Dr.Karen
Cooper(UniversityofCalifornia,SanJose)
5. Developauniquetheoryastowhyadolescentsandyoungaremoresusceptibletoonlineattacksthanotheragegroups.
6. Discussthebasictenetsbehindthistheoryinaformalsynthesisresearchpaper.
7. Createandadministersurvey,containingdemographics,academicsandtwotests.
8. Analyzevariousresponsestoquestionsadministeredinthesurvey,andanalyzeanyparticulartrendswhichseemanomalous.
9. GatherStatistics,includingMeanScore,TotalCorrect,TotalWrong,StandardDeviation,fromresponsedata.
10. PresentpreliminarydatatoRiverHillHighSchoolComputerScienceclasses.
11. Createanoriginalwebsitewhichdetailstheresearchprocesstopeersandprofessionals.

_____________________________________________________________________________________________

TeachersSignature
StudentSignature

Graduation Year:
2017

S-ar putea să vă placă și