The idea is to investigate how risk assessment is


" An optimised risk assessment methodology using threat intelligence in SaaS Cloud Deployments"

You should focus on the traditional risk assessment processes and both strengths and limitations presented in SaaS deployments. You can then introduce a combined (updated) model suitable for Cloud service delivery models.

Typical steps involve:

the idea is to investigate how risk assessment is influenced (positively or negatively) by employing cyber threat intelligence in PT lifecycle for Cloud deployments.

Asset identification

Threat identification

Vulnerability identification

Risk assessment

Risk analysis

Controls in place (to be placed)

Communication

Review

Instructions:

The most important thing at the moment is to investigate how CTI embedded in PT lifecycle can influence the process (positively or negatively).

You can mention additional guidelines and standards in risk management as part of literature review. You need to also discuss how CTI is used today in threat identification / discovery (which is the initial part in risk management)

Aim will be to investigate how CTI can help us to improve the overall risk assessment process using SaaS as the platform. PT stands for penetration testing.

Thesis Writing-up (general structure)

- Abstract

- Acknowledgments

- Consent that you accept your thesis to be made available on BREO/LRC

- Contents page

- Introduction

- Literature review

- Research design/methodology

- Primary research work models, artefact design

- Technical Details and artefact development/implementation

- Testing and evaluation

- Conclusions

- References

- Appendices

- Maximum pages = 70

- Introduction

- The problem

- Main aim and objectives

- Methodologies and outcomes

- Thesis structure

Research

- General background to the subject

- Specific studies on the subject closely related existing work / examples

- Project realisation

- Technical requirements

- Design / structural formation

- Data acquisition

- System implementation

- Testing and analysis of results

- Improvement

- Overall evaluation

- Conclusions and recommendations

- Academic context and value of project

- References - Sources

- Published literature - books, conference papers and journal articles (best)

- References - Citation

- Appropriate citing the references is important. It acknowledges other's work and avoids plagiarism suspect.

- Appendices - what is included

- Poster

- Market survey returns

- Interim progress report

- Project proposal

- Test data

Request for Solution File

Ask an Expert for Answer!!
Dissertation: The idea is to investigate how risk assessment is
Reference No:- TGS01535093

Expected delivery within 24 Hours