Skip to main content

Using Splunk Tool to Identify and Fix Network Security


Security is the priority in any business organization. Current network architecture extends across different platforms extending beyond traditional walls and including data and information centers, endpoints, virtual environments, branch offices and cloud computing Cisco.com, 2015).  Lack of access to current security intelligence, business organizations, exposes their sensitive business data and information to hackers, malware, intruders as well as data and information thieves without being aware that a risk exists (Cisco.com, 2015). The most vulnerable areas business infrastructures encountering new types of attacks include mobile devices, mobile applications, web-enabled systems, social media, hypervisors, smart devices, as well as home computers. According to analysis on security issues, about 50 billion connected devices are likely to have been in use by 2020 (Cisco.com, 2015). The increasing use of connected devices shall lead to increased problems with security. The connected end-to-end points shall promote business operations through promoting business transactions, communication, and dissemination of data and information. However, those points will act as most vulnerable areas of implementing potential enterprise attacks. The security individuals, therefore, are required to establish dynamic methods, tools, and mechanisms that protect dynamic perimeter by creating an infinite number of security points (Lisa, 2012). The current vulnerabilities within business infrastructures can be solved through implementation of dynamic network security monitoring tool referred to as Splunk (Cisco.com, 2015).

Purpose and Duties

Current business infrastructure ensures information assurance through the implementation of different software and hardware tool. Business systems are protected using Intruder Prevention Systems (IPS), Intruder Detection Systems (IDS), secure wireless networks, Computer End Points, as well as network security analysis appliances (Global Innovation Technology, 2014). The purpose of study research is to define effective and efficient implementation and application of network security monitoring tools. The main task in research operations includes implementation of best practices by running Splunk within business systems and networks. My main duties are the configuring and setting Splunk to help in analyzing security posture for multiple security devices. I will participate in embedding Splunk within the network as well as systems that already exist within the network.

Company Operations 

I will work with major network and security companies in the market such as CITRIX within the department of information assurance. The aim and objective of Citrix company are the provisions of Network support through providing network tools and devices for securing and monitoring Local Area Networks (LAN), Wide Area Networks (WAN), the Internet and Demilitarized Zone (DMZ) (Global Innovation Technology, 2014).  The main activities in session shall include analyzing security posture for multiple business enterprise devices using Splunk. Setting and configuring Splunk tool to work effectively with user-friendly dashboards as well as providing Splunk for helping security individuals in auditing users within systems report for compliance as well as risks mitigation. Security assurance department will mainly deal with monitoring cyber threats and malicious activities within connected networks. Splunk security apps such as   Symantec Deep Sight Security Intelligence is applied in running networks through ensuring effective fighting of cyber crimes (Global Innovation Technology, 2014). The department ensures the provision of the following data and information to support the mission and objectives aims of Citrix.
  1. Getting information about the current threats posed against organization data and information
  2. Drilling down on specific events to analyze recurring threats
  3. Analyzing most hostile, reputation, as well as confidential values of a given harmful computer IP URL data
  4. Providing breakdown of malicious IP addresses within the network.

Methodology

Action Research Methodology

Action research methodology refers to an approach in which researcher collaborates with experts in a particular field of study with a purpose of developing a solution to a particular problem (Bryman, & Bell, 2011). The research methodology is characterized process involving collaborative inquiry whereby researcher interacts with workers, experts, as well consultants within the field of study.  It is a process of inducing social change by identifying problems and their appropriate solution. It is usually applied with a purpose of improving a particular situation, practices or revising a specific condition in business operations (Collis, & Hussey, 2003). Action research is the type of social experiment that implements a specific method to test hypothesis experienced in real world environment. It deals with specific business realities focusing on specific social and local organizational factors while conducting action research. It adopts critical approaches that guide in providing most effective change. It has a  basic model consisting of four stages referred to as planning, acting, observation and reflection.

History of Action Research

Kurt Lewin discovered the process action research in the early 1940s. According to Lewin, Action research involved a group of participants or practitioners and experts in science (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002). Practitioners conducted a research process, which involved collaboration, inquiry and social interactions. His method was characterized by a cycle of events whereby practitioners participated in social activities with social scientists. The process involved spiral stages of the self-reflective cycle. According to Lewin, the cycles consisted of planning stage to initiate change, implementing or acting stage, observation stage and the planning stage (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002). Action research has been applied in different settings. Among the most common applications includes improving education processes such as learning curriculum to include sports and gaming. It has also been applied by social scientists in improving psychology, engineering, nursing and social, political sectors. Action research has paved the way to other major research methodologies as well as guiding scientists in redefining scientific methodologies that existed (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002).

Justification of Action Research

Action research process supports the process of learning. It enhances better understanding by allowing proper understanding of specific situations, needs, and specification. It guides researchers towards getting the appropriate problem that requires a particular change. The methodology is the most appropriate in providing solutions to network security using Splunk tool (Bryman, & Bell, 2011). It will facilitate effective and efficient understanding of the principles and standards that must be applied. Through collaboration and interaction process with experts, the methodology shall provide a better environment for learning configurations and settings required while implementing Splunk tool. Systematically procedures implemented through action research cycle shall facilitate delivering of high quality and acceptable projects that satisfy users. The participatory research shall guarantee proper mentorship as well as the effective acquisition of knowledge, skills, and experience required as a profession while performing my duties and career (Bryman, & Bell, 2011).

Stages of Action Research

The stages of action research include planning, action, observation, and reflection stage. The planning stage involves identifying and understanding the social problem that requires a particular change or solution. Participants and social scientists meet to schedule the procedures and approaches that should be adopted (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002). The second stage is action stage which involves the implementation of the procedures defined in the planning stage. The activities specified are implemented according to schedule and agreed strategies (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002).  The third stage is observation stage. During observation, the consequences of actions taken are evaluated. Researchers conduct data and information collection to identify specific effects of the implemented action. The effects of change are determined and its results evaluated (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002). The fourth step is the reflection stage. During reflection stage, researchers and social scientists brainstorm to analyze, evaluate and validate the effectiveness of change. The fourth step determines whether the project will be terminated to implement another or another cycle can be started to improve the applied change or to initiate next project.  

Significance of Action Research

It supports the development of projects from scratch because of easy generation of new ideas that promote a better and positive change. The methodology is informative, involving and knowledge oriented. It is most appropriate in conducting objectives, aims and goals are not clearly defined. Action research supports all other forms of study research thus can be applied in different domains. The fact that it is repetitive and collaborative in nature all stakeholders are easily involved in research process thus guaranteeing acceptable delivering of projects (Collis, & Hussey, 2003).
Problem Statement
Splunk Network Security Literature Review
Ancient tools for managing, controlling and monitoring Information Technology (IT) infrastructure have failed to provide reliable security because of rampant changes occurring in modern data and information centers (Splunk for IT Operations, 2013). Although traditional troubleshooting and diagnosing was based on manual operations, current advancements in technology require more improved analytical systems (Splunk for IT Operations, 2013). Traditional security issues could only handle cases dealing with systems performance.          
Alternative tools such as Splunk tools are highly versatile, scalable and reliable for analyzing data and information. It combines all data engines and machine security data and information with the intention of updating security individuals concerning data and information security (Reybok, et al., 2015). Splunk facilitates information and security assurance through collecting indexes and live data and information from any source. Among the network equipment monitored includes custom applications, application servers, web servers, database servers, mail servers, virtual machines, operating systems, hypervisors as well as other network utilities (Reybok, et al., 2015). The Splunk tool guarantees effective and efficient operations since it does not rely on parsers, adapters, or back-end databases for analyzing and processing security concerns (Splunk for IT Operations, 2013). 
Network security control involves the implementation of inventory management and control of software through defining the level of authorization. Changes to software that contribute to security issues are accomplished through managing software changes, whitelisting, and using vulnerability management tools (Splunk Inc, 2016). Among the tools applied includes Titanium, IBM, BigFix, Microsoft System Center, as well as Bit9 Security Platform (Splunk Inc, 2016).  Splunk software is integrated with various software systems to assist in securing network systems. The role of Slunk software in network systems is to:
Splunk helps in gathering data and information concerning installed software. It monitors patches updates in a given system through implementation of scripting inputs, set standards and specific scripts (Wilde, Hategan, Wozniak, Clifford, Katz, & Foster, 2011). Splunk is well utilized in areas such as Splunk Add-on for Microsoft Windows, UNIX and Linux network systems. The Splunk software is mostly used to facilitate reporting and alerting administrators in case of any vulnerability associated with software patches. It based on performing analysis for each entry of software. It generates reports in the form of XML, CSV, as well as other formats that correspond particular network security problem (Splunk Inc, 2016). It is responsible for performing correlations from different scripts and third-party tools through comparing them with other enterprise based data and information sources. Splunk software can be set and configured to perform all analysis operations on network systems such as configuration management database (CMDB), harshly based whitelists among other utilities (Gupta, et al., 2016). The significance of the Splunk tool is providing accurate calculations, based on patterns, trends, and behavior of data and information assets (Splunk Inc, 2016).
Splunk Applications in Enterprise
In enterprises, security can be used in facilitating secure configurations that determine processing and handling of information in real time (Gupta, et al., 2016). Enterprise security is applied in identifying the various attack and hacking behavior as well as misconfigurations that expose the network to vulnerable environments. It can identify, verify and validate sensitive credential characteristics such as password lengths as well their defined period (Prabhakar, Pankanti, & Jain, 2003).  It works through displaying n contents on display units such as traffic search, system center, and time center. The windows reveal parts of the system that does not meet international standards of settings and configurations (Prabhakar, Pankanti, & Jain, 2003). Splunk's evaluates data and information repository systems on networks and provides all threats in a list. Among the problems highlighted includes hash file values, malicious registry keys, Internet Protocol (IP) addressing, domain naming issues, among another IOC (Gupta, et al., 2016). The tool facilitates effective and efficient handling of user accounts through maintaining restrictions, rights, and rules of various accounts. It monitors areas such as operating systems levels weaknesses on the enabled guest accounts, some lenient pseudo configurations, as well as failure to define default accounts such as administrator and root (Church, et al. 2015).
Benefits of Splunk Tool
Splunk is a centralized network monitoring tool that guarantees provision of intelligent security.  analysts. It helps in troubleshooting and diagnosing through determining areas prone to vulnerabilities as well as sections having penetration weaknesses (Kim, Ma, & Park, 2016). It provides prior updates concerning dangerous situations such as hacking, denial of services, viruses attack, malware infections and malicious scripts.
Splunk tool facilitates real time processing; it has a large storage device for enhancing high-level processing. Splunk tool supports input of data and information that can exist in any format. It supports CVS, Json as well as other formats. Splunk tool can be applied in setting and configuring of systems to give alerts. It enhances sending of messages events and notifications during initialization of machines or starting machine operations. Splunk tools provide an accurate prediction of various resources needed during analysis processes. It is also used for creating knowledge objects by deriving knowledge data and information (Kim, Ma, & Park, 2016). It is also best applied for facilitating operational objects and operational intelligence. Most common applications of functionalities of Splunk tool include
Analyzing systems performance such as processing power,
Troubleshooting any failure conditions such as connection failures
Monitoring business metrics and measures such as Key Performance Indicators (KPI) 
Searching and investigating particular outcome of processing resources, retrieving, translating, and translation  
Storing and retrieving data and information from database systems as well as other repository systems     
The characteristics of plunk tool are to facilitate systems operations such as searching, analyzing and visualizing results on the databases. Splunk tool ensures that the systems are well connected to the Systems as a service (SaaS) settings and configurations. Splunk tools support both on premise and out of premise backup and recovery procedures. Splunk tools also support various types of plugin systems as well as the integration of various types of application systems. Plunk's tools have the capability of connecting to input and output data and information types for facilitating direct customer support (Prabhakar, Pankanti, & Jain, 2003). The production of various documentation reveals effective and efficient logic on writing systems logs. The aim and objective of entire evaluation include Involved Splunk systems that implement machine learning commands with a strong system that applies the use of work bench in creating custom modeling using user utility issues. The systems use techniques, such turnkey, out of box analysis focusing on developing effective management of IT services and Security.  
Proposal
The Splunk tool was mainly set and configured to improve areas such as e-commerce. Through benchmarking studies the industries that I observed applying Splunk tool included Expedia. The major functions included monitoring health applications as well as performance. Splunk tool ensures complete evaluation of real time visibility especially for data and information that range of tens of terabytes or above.
On other areas such as cloud computing industries, Splunk is well known for implementing standards in Software as a Service (SaaS) through the use of Salesforce.com. I was capable of implementing Splunk dashboards in IT sector for effective and efficient monitoring of customer experiences. The entire systems encourage managers in performing analytical data to managers. It equally guarantees complete troubleshooting of customer’s queries at a rate of 100,000 customers per second. 
Problem Statement
Big data concepts and storing of related data and information is a trend that causes difficulties in analyzing business data and information. A major challenge includes monitoring, tracking and checking technology infrastructure within network systems. The network systems are also affected by security issues such as lack of business application security procedures thus leading to insights that affect performance and business results. Threats and vulnerable attacks on systems are rampant a state that raises concerns on the best technology to implement technological analysis. The future analysis shall highly focus on building specific cases, applications, and tools such as IT Service Intelligence, and User Behavior Analytics.
A major problem includes solving issues corresponding to collecting of index logs, machine data as well as other resources from database sources. The problems associated with powerful searching analyzing and visualizing capabilities associated with empowering different users. The tools applied shall enhance autonomy, security as well as the direct implementation of all analytical corrective measures on user accounts. Proposed technology is intended to solve issues concerned with visibility and accessibility of online premises, cloud computing technology, among other hybrid technology systems. The scaling of systems vulnerabilities such as hacking, vulnerable attacks, as well as failure to use and apply proper measures in the analysis systems shall be solved using the appropriate tools that indicate collective solutions to the entire systems. Finally, secure operations such as securing installation systems, applications, and devices within systems are highly recommended through applying technical methods. The Splunk technology is intended at solving issues that occur when manual or physical methods are applied by technicians to control and manage security. The system is intended to automate security parameters that are certain in delivering most desirable security using tools, software, and hardware, as well as human, intervene measures.
Iteration 1: Orientation to Slunk Network Security
The introduction shall cover various network structures that require Slunk technology. The study shall analyze components, features as well as utilities of the network. The session shall determine the potential condition and status of security within the network. Existing security measures and strategies shall be analyzed as the major background of the study. Researchers shall classify various software and hardware tools and their corresponding security requirements. The iteration shall involve an introduction to Slunk applications. Introduction shall cover infrastructure of the security, applications, and work with the tool. It shall also incorporate introduction from on various networking parameters applied to facilitate secure environment. 
Iteration 2: Training, Seminars, and Meetings
The session shall concentrate on collecting knowledge, skills, and experiences from the different point of view. It shall involve interacting with experts in the field of security for effective understanding how various security tools operate. The activities involved are interviews, workshops as well as practical learning about Splunk. The session shall include benchmarking studies in the existing network systems to observe implementation and structure of Splunk. Learning shall involve all appropriate methods and methodologies that can be applied in the certain field. Training shall cover standards and ethical issues that apply to various security measures. It shall also cover most important elements of security such as Confidentiality, integrity, and availability.   
Iteration 3: Data and Information Collection
The goal of the study is providing high-level accessibility to security issues encountered by various users. The methodologies applied in the research shall include a questionnaire, observations, and interviews.  The individuals included in the study research shall include clients, stakeholders, managers, and directors. The session shall define the problems within various environments such as a business sector. Researchers shall perform needs and specifications analysis to come up with needs and requirement deliverables. The session shall also perform systems analysis to predict possible security vulnerabilities that can be experienced within the systems. The session shall provide alternative solutions to problems and deduce most appropriate technology to solve existing security issues completely. Finally, the session shall define most desirable, acceptable, and security-oriented approach worth implementing.
Iteration 4: Planning, Designing, and infrastructure
The final iteration shall involve defining a plan to implement solution selected. The solution designed shall ensure that the proposal provides easy ways and measures for decision making to network managers and systems. The design shall ensure security individuals understands all security processes through receiving alerts about incoming and ongoing individual host or group of hosts. The session shall involve evaluation of the scope as well as schedule applied in the implementation process. The session shall include conducting feasibility studies to validate if the proposed solution is viable and worth implementation. Other activities shall include budgeting and defining the project checkpoints. The final activities shall include designing the infrastructure of the proposed security systems. Hardware and software tools shall be provided, input and output data and information shall be guaranteed as well as other design requirements.


Iteration 1: Orientation to Splunk Network Security


Plan
The iteration process is scheduled to take about two weeks. The introduction session shall involve conducting research through the web to discover modern technologies as well as areas that implement Splunk tools. The session shall involve research from websites, from books, as well as through libraries checking. The research operations shall take two days. The research work shall a personal guidance far familiarizing with Splunk technologies. Another period of three days shall be used to study in details areas within the network where Splunk tools are applied. The session shall involve meeting with experts as well as analyzing several network infrastructures that apply the use of Splunk systems (R. W. Attar, Personal communication, May 24, 2017). Research shall be required to perform benchmarking network systems that analyze business operations using Splunk technology. The first week activities shall be supervised by Mrs. Attar, the Chief Systems Security (CSS). The first half of the second week during orientation process shall include understanding the structure of the Splunk system. The study shall perform analysis on the current planning and designing of security measures. The study shall check on how various technologies are applied to implement security. The researcher shall learn how a complete system infrastructure is drawn as well as tools embedded within network systems (T. P. Frank, Personal communication, May 25, 2017). Mr. Frank shall guide researchers on covering various security infrastructures, applications, and a tool that’s implement Splunk.
The second half of the second week shall involve researchers classifying various software and hardware tools and their corresponding security requirements. The session shall define criteria as well as the strategies applied by Splunk tools to facilitate effective security measures (H. K. Beth, Personal communication, May 27, 2017). Researchers shall be expected to understand techniques as well as criteria applied by systems to implement security parameters. Miss shall facilitate the session. Beth Chief Information Officer (CIO).
Action
I took part in conducting internet research studies to analyze various areas where Splunk technology is applied. Among the domains where Splunk tools are vital to include providing security, and compliance in business operations through eliminating frauds such as a white collar. According to online research.It facilitates effective and efficient delivering of systems applications on time and based on high level of accuracy.  Through benchmarking operations, I managed to visit most of the Internet of Things (IOT) and applied industries.  Most domains where Splunk technology is appropriate to include in collecting data and information from devices, managing and controlling other systems, and being applied as sensors. Splunk tools were also applied in Supervisory control and data acquisition (SCADA) systems. Other uses included controlling operations of handheld devices such as mobile phones and point of sale devices (R. W. Attar, Personal communication, June 1, 2017).
The structure of the Splunk systems is composing of two main divisions. One of the divisions is a machine to machine architecture as well as human to human architecture. Among the embedded systems within Splunk tool include using processor-based architectures. It has systems HVAC controllers, Smart electronic meters, Global Positioning Systems (GPS) devices and Radio Frequency Identification (RFID) devices (T. P. Frank, Personal communication, June 3, 2017). Other areas that incorporate spunk includes automobile devices, medical devices, as well as other systems that implement machine data and information.
The techniques applied in Splunk systems include incorporation of systems software operations such as business analysis. It implements principles of visibility and business intelligence. It is based on learning situations to produce inferences such as trends and patterns. It mainly uses criteria of diagnosing, as well finding and fixing problems with and intention of fixing particular issues (H. K. Beth, Personal communication, June 5, 2017).  
Observation
The observations identify during personal research has found that application of Splunk tool is vital especially in managing to control and running business operations.  The most effective and efficient operations including in the field of network security, systems analysis as well as in finding trends, patterns, and behavior. Machine learning is an application that was most applicable in almost all fields. Significance technologies noted as one of the implementers of Slunk include the big data technology, cloud computing, and Internet of Things (IOT) (R. W. Attar, Personal communication, June 6, 2017). Direct applications of the Splunk tools is recording user transactions, customer behavior, sensing security vulnerabilities, as well as learning machine behavior.  In security operations within networked infrastructures, Plunk tools are set and configured to provide effective and efficient incident response capabilities in business operations.
The Splunk tool has high-level usability techniques such as real-time correlation as well as in-depth monitoring of systems across data and information sources. It performs analysis that proofs effective statistical analysis for advanced pattern detection as well as identification of threat and defense mechanisms. In networking, the complexity of network utilities is made easy through the use of Splunk tools. Tools guarantee complete resolving of problems, identifying infrastructural services (T. P. Frank, Personal communication, June 7, 2017). It is a tool that guarantees complete quality assurance regarding troubleshooting, isolation of network problems as well as assuring that information and data security is given priority. Among the data and information management platforms, the software components observed during benchmarking process included Splunk applications. It has several categories of applications such as VMware, Microsoft, Cisco hardware, Microsoft Active Directory, and Citrix. The process of coping with issues of compatibility Splunk supports alternative software such as Linux Unix, Windows, and virtual technologies among others (H. K. Beth, Personal communication, June 9, 2017).          
Reflection
The main goal of orientation process is to familiarize understand as well appreciate the various components and contents of the Splunk tools. The orientation session has equipped me with adequate resources that have highly led to complete appreciating the functionalities of Splunk tools in technology. Among the successfully introduced areas included business insight (R. W. Attar, Personal communication, June 12, 2017). Splunk facilitates making better and informed decision making through understanding various business analyzed information that incorporates trends, patterns, and behavior. It enhances intelligence support in the events concerning data and information security.  The introduction session has also covered areas such as the operations visibility implemented through maintaining records for future references. Splunk guarantees proactive observations through monitoring sensitive infrastructures such as networks. It facilitates effective understanding of business issues, problems, and attacks before they strike in the organization causing adverse effects on customer’s services, revenue, and personal data (T. P. Frank, Personal communication, June 12, 2017).
Through research, Splunk is applied in facilitating investigative analysis with the intention of bringing changes within multiple data and information sources. The tools are vital in bringing new methodologies of trailing attackers, intruders, and insiders. The tool guarantees fast and effective responses within the shortest time. Research involving orientation to the organization. Connections and embedding various software systems is possible such as integrating relational data and information databases, facilitating bi-directional connectivity, as well as establishing Hadoop data and information linkage. The future analysis shall facilitate effective and efficient implementation of future iterations through incorporating the acquired knowledge.  Among the observed and future research work shall be based on Splunk infrastructures that focus at learning g from huge business operations such as Amazon Web Services (AWS) (H. K. Beth, Personal communication, June 14, 2017).
The achieved goals include determining of various performances monitoring in categories such as monitoring large scale, as well as enhancing distributed mission on critical applications. I have understood that Splunk tool can be implemented in solving isolate problems such as diagnosing, and troubleshooting issues. The entire operations facilitate complete monitoring of performance and service levels. The connections provide connection transactions across different components and infrastructures.    

 

Iteration 2 Planning

 

Plan

Planning session shall take two weeks. During first half of first-week research shall meet planning and design experts for assessing the requirements of the new adoption.  The activities involved shall include comparing the most efficient and effective resources in industries who take parts in implementing as well as successful execution of Splunk tools. The tasks in the session shall include performing data and information collection techniques to identify user specifications, needs, and requirement (L. K. Han, personal communication, April 23, 2017). The session manager shall be MR. Han, the Slunk tools planning and designing consultant. During the second half of the first-week, researchers shall look into the issues to be addressed in the adoption, process. The session shall involve preparation of the needed resources as well as defining the environment as well as platforms that implement the desired Splunk systems. Researchers shall be required to come up with different solutions that can be adopted through evaluation of cost analysis, viability as well as user requirements. The tasks during the study shall include conducting feasibility studies and presenting the reports to executive teams and investors (B. G. Ivy, personal communication, April 25, 2017). Facilitator of the session will be Mrs. Ivy, the pioneer in the project proposal and project development. 
The first half of the second week shall involve having brain storming meeting session with a purpose of evaluating, validating and assessing identified solutions. Researchers shall be involved in selecting the most viable solution that guarantees and offers the greatest benefits in securing networks, systems, as well as company utilities (B. G. Ivy, personal communication, April 28, 2017).  Finally, during the last session of second-week participants shall engage in discussions meeting to define scope, as well as providing the budget plan for the entire systems implementation.

Action

I took part in the meeting that involved preparation, planning and organizing the implementation of Splunk oriented systems that ensure the security of data and information assurance. During the meeting with Mr. Han and the designing committee, we computed the design as well as of the Splunk systems in the security domain. The designing process involved benchmarking from other industries those implements Splunk tools (L. K. Han, personal communication, May 02, 2017). In the study, session companies visited included Enterprise Management Associates (EMA). The design implemented an involved implementation of systems capable of indexing, searching and reporting capabilities. Design interface contains links to LOB (Line of Business) systems for effective and efficient solving of problems. I also took part in performing data and information collection. According to analysis performed users such as business stake holders, directors, and managers require Splunk systems to facilitate recording of user transactions, identifying customer behaviors, collecting and analyzing cyber security activities (L. K. Han, personal communication, May 03, 2017). Security analysts require systems that can enhance fast evaluation of security threats fraud activities as well as facilitate online security analysis.
Other activities involved performing the feasibility study analysis through the assistance of different experts. During the session, various factors considered included evaluating the economic feasibility, functional feasibility, operational feasibility and occupational feasibility. Through the assistance of Mrs. Ivy, we computed the budget by allocating money values to the various requirements.  Among the utilities required included hardware and software components, human resources, among other miscellaneous commodities. Budget and requirement deliverables were presented to a panel of investors through webinars, video conferencing and presentations to cater for distance stakeholders, executives, and financiers. Alternative systems included Performance Key Indicators (PKI) systems, DevOps and Hadoop databases (B. G. Ivy, personal communication, May 06, 2017). However, their significance in the study analysis was not as significant. Alternative systems could not effectively solve issues involving security. I also took activities such as making a decision on the scope of Splunk tools. Scope covered most of the business applications such as searching and investigating security monitoring and alerting, operational visibility of activities and utilities, as well as real time business insight measures (B. G. Ivy, personal communication, May 05, 2017). The resource planning operations involved organizing order for delivering utilities to accomplish the plan. Resources allocated involved human resources, development platforms, research and innovations hubs as well as allocating various teams duties, responsibilities, and tasks (F. J. Yvette, personal communication, May 07, 2017). The entire collaboration was to implement a plunk infrastructure with the following functionalities and features as shown in the figure below.


The Splunk architecture framework
       

Observation

Through the session facilitated by Mr. Han, Mrs. Ivy, and Miss. Yvette, I have observed that various planning operations are vital in the development of quality, acceptable and user oriented systems. The entire operation involving planning started with a simple design which was integrated into a complex system that involved different functionalities in business operations (B. G. Ivy, personal communication, May 09, 2017). Through the study, I observed that methods and methodologies applied during data and information collection included observation, questionnaire, interviews and demographic benchmarking. Industries implementing Plunk technologies are highly benefiting from services such as receiving data and information from different network ports that are capable of running scripts (L. K. Han, personal communication, May 10, 2017). The capability facilitates automated data and information forwarding.  Among security measures and data and information assurance measures enjoyed by various Companies include sending alerts and threshold to individual’s servers. I observed that the Splunk tool has the capability of incorporating failure recovery through analytical operations.
The planning phase provided earlier budget as well as the flow of development operation s in a systematic procedure. According to the planning committee, the most critical resources included enough finances, human resources as well as development platforms. Information based on user specifications as well as the quality of systems demanded by users is vital for developing acceptable and reliable systems (B. G. Ivy, personal communication, May 11, 2017). The planning session provides guarantee that the proposed system satisfy user requirements as well as providing accurate expectations from user’s point of view. According to interviews, the desired Splunk system should have the following features have a platform which enables users to have machine readable data and information that can be feed into machine data (F. J. Yvette, personal communication, May 11, 2017). Activities accomplished included creating accounts for various users to facilitate complete participants as users. I have established levels of administration, access privileges, as well as establishing rules based on functionality principles. The various sessions have enhanced effective and efficient allocation of duties within the system interior and exterior systems (F. J. Yvette, personal communication, May 12, 2017). Through training, I was capable of implementing database allocation privileges under strong surveillance and monitoring from Mr. Miss Yvette.

Reflection

The planning session went well. All planned activities were accomplished according to expectations and focus of teams. Through the entire session, I have acquired knowledge skills as well as detailed information required when planning and implementing systems planning session. Through the plan, I have understood the significance of prototype models that guide in the implementation of appropriate systems. I have understood project management and development operations that facilitate proper implementation and guidance in implementing Splunk systems that transform business operations. The planning session has facilitated effective and efficient accomplishing of Data and information physical security that ensure organizations are dealing with physical security such as earthquakes, volcanoes eruptions, flooding, among other catastrophic disasters to guarantee continuity of business operations (L. K. Han, personal communication, May 12, 2017). The planning dedicated Splunk as a tool to implement Application Monitoring through the use of knowledge objects, which can monitor other business applications especially in real-time (L. K. Han, personal communication, May 12, 2017). The committee meeting during brain storming session planned for systems that can support configuration of alerts with a purpose of notifying systems administrators when the business application crashes or when users are experiencing downtime.
Planning session has accomplished a trend that involves network security by increasing security in organization systems. The architecture is expected to accomplish security through blacklisting certain IP from accessing network as well blocking other network systems from gaining penetration (L. K. Han, personal communication, May 13, 2017). The plan is focusing on implementing knowledge based objects referred to as lookups. Another utility that shall be incorporated in the Plunk security systems is the governing and management of employee to ensure that all activities and functions of employees are monitored (B. G. Ivy, personal communication, May 14, 2017). The bench marked systems accomplished the plan through monitoring activities of users. Fraud activities among employees shall be controlled through giving notices, warnings as well as summoning them for the period. The systems shall also create a list of users through implementing rules that prevent users from copying data and information as well as assigning various members active and passive utility function (F. J. Yvette, personal communication, May 15, 2017).
The training session has provided effective and efficient methodologies that can enhance integration of other security enhancing systems. Among incorporated systems include the use of machine data also known as data exhaust. The major activity analyzed included exhaustive implementation of techniques that analyze faster growing of segments that incorporate big data concepts (P. C. Faith, personal communication, May 23, 2017). The various sections that I was trained to implement machine data analyzing included tools for analyzing websites, applications, servers, networks as well as mobile devices. I was trained in installing tools that ensure exchange of information between various devices and technologies such consolidation analysis systems.

Iteration 3 Implementation

Plan

The implementation research session shall take two weeks. During the implementation process, the research will involve the adoption of the different IT solutions for effective accomplishment of the desired system using the designed architecture. The first half of the first week shall involve a team of developers with researchers shall developing the plank systems that benefits for the players in the information assurance industry. The implementation process shall link all stake holders through facilitating complete assessment of in resolving issues and challenges established by the stakeholders and users during problems assessment and problem definition process (K. D. Mayor, personal communication, May 17, 2017). The facilitator of the session shall be Mr. Mayor, the background development officer. 
Other sessions shall concentrate mainly on development and accomplishment of the Plunk architecture. The second half of the week shall develop and design the forwarder with the capability of intelligently routing data and information across other network platforms. Developers shall ensure security measures such as cloning of data and information is guaranteed (P. C. Faith, personal communication, May 18, 2017). Researchers shall be involved in activities such as load balancing to have enough experience in determining systems performance and speed. The facilitator of the session shall be Mrs. Elias the programming engineer during the first half of second-week activities performed shall include developing the user interface for the servers systems. The operations shall involve deployment of server modern server technologies for the effective management of the entire business operations. Both client and server configurations and settings shall be provided to ensure that the entire systems adhere to calling of instances of various applications (W. R. Elias, personal communication, May 19, 2017).
The first half of second-week users shall enforce activities such as creating views access controls as well as accounts management modules. Other activities involved shall include integration of searching components as well as analytical systems for analyzing reports and creating summaries. Other systems that shall include integrating Visualization dashboards. Miss shall monitor the session. Faith knowledge based systems developer. Final activities shall involve creating Splunk web interfaces.  The session shall involve incorporating user interface graphics as well as other graphical user interfaces. The session shall also include testing of systems for quality as well as efficiency. A panel of experts shall access the testing operations for validating and verifying developed system. Researchers shall be introduced to quality assurance principles and methods that guarantee that developed systems adhere to quality and international standards of quality (P. C. Faith, personal communication, May 20, 2017). 

Activity

I took part in the implementation process. Activities involved included creating the user interfaces that facilitate the transformation of data and information through security measures. Through the assistance of interface developers, I was capable of integrating major applications such as business platforms, organization profiles among other applications. Through implementation, I was able to perform cloning as a method of creating multiple interfaces of events.  Through creating of databases, I was able to visualize the significance of creating data source where as load balancing and sensitive data and information is evaluated. Other operations performed involved creating of instances. Security parameters should guarantee that even if one instance fails, another instance should ensure that no communication failure occurs (W. R. Elias, personal communication, May 22, 2017). Instances created guaranteed that data and information are transmitted without encountering problems. I also took part in integrating systems such as analytical tools.  Development process involved incorporating systems such as financial records, manufacturing as well as logistic data and information. The systems involved inserting tools capable of performing monthly reporting as well as facilitating business management operations (P. C. Faith, personal communication, May 23, 2017).
Through the intervention of Mr. mayor, we were capable of attaching map reduce software framework to support functionalities such as distributed computing on large data and information sets such as clusters of computers. An implemented system facilitates easier searching of data and information. An integrated system includes knowledge based systems that facilitate tagging of data and information (K. D. Mayor, personal communication, May 24, 2017). Through implementation process, I was capable of creating event types such as creating search constraints, views, and systems servers operands. Major functions applied to the plunk systems included functions for data input functions, data storage functions as well as data searching functionalities. The three main components that Miss. Faith helped in incorporating included Splunk forwarder designed for forwarding data and information. Another utility included Splunk indexer for parsing and indexing data and information. It also included search head containing user graphic interfaces for searching, analyzing, as well as reporting across the platforms (K. D. Mayor, personal communication, May 25, 2017).

Observations

I observed that Splunk Server should implement various methods and methodologies. Programming technologies applied in implementing plunk systems included web application servers, Python, Ajax, CSS, XSLT, and XML. I observed that risk analysis systems were implemented through designing correlation search triggers for enhancing risk analysis as well as performing response analysis. Developed Splunk systems allow the provision of granular role based security modeling (K. D. Mayor, personal communication, May 27, 2017). The systems facilitate authentication of user activities. It facilitates effective implementation of web user interfaces, command line interfaces, as well business application interfaces through the use of Slunk Application Programming Interface (API) (W. R. Elias, personal communication, May 27, 2017). Through security analytical tools integrated the systems facilitates implementation of activities such as troubleshooting, investigating security incidences, sending security alerts as well as ensuring that data and information have fully been secured. Splunk systems ensure full compliance of systems through sensitive production security analysis reports (P. C. Faith, personal communication, May 28, 2017). Slunk architecture supports security analysis through taking a proactive stance for investigating and responding to sensitive issues. It facilitates monitoring and triaging verifying and escalating of data and information through responding to the breaching of security parameters or malware infection.
The Slunk tool supports data and information assurance through collecting indexes log as well as machine data from any source. It has utilities for performing powerful security search, analyzing intelligence learning as well as visualization capabilities that empower users. I observed that through testing and evaluation processes (W. R. Elias, personal communication, May 29, 2017), implemented systems are capable of mitigating fraud and cyber threat through detecting areas with security vulnerabilities. The performance testing operations revealed that Splunk guarantees quality performance through facilitating real time analysis through guaranteeing operational intelligence as well as business reporting (P. C. Faith, personal communication, May 29, 2017).

Reflection

The session has facilitated effective and efficient implementation of Splunk systems. The systems are capable of ensuring data and information security assurance through enforcing confidentiality, integrity, and availability (K. D. Mayor, personal communication, May 01, 2017). Entire operations involving business activities can be secured using automated systems that ensure Splunk tool within the Splunk tool are completely achieved using cloud computing and analytical tools. The accomplished systems promote the effective and efficient application of incident response, disaster recovery, and business continuity through giving alerts on security data. Current systems guarantee effective and efficient collecting, aggregating, de-duplicating, and prioritizing of threats using intelligence systems that derive learning from multiple sources (K. D. Mayor, personal communication, May 01, 2017). The developed system can ensure complete streamlining of security operations through conducting rapid investigations through applying ad-hoc searches. The systems were fully verified and validated as worth for detecting and reducing internal and external cyber threats, attacks, intrusion as well as malware. New technologies such as security analysis systems enhance increased implementation of capabilities that promote detection of threats and optimization of activities that optimize incident responses.
The incorporation of Hadoop database systems promotes effective and efficient accomplishing of big data and information support through reducing internet traffic as well as machine data and information analyzing. The analytical tools are designed to support all types of data and information by analyzing machine data from systems that have varying formats. Among strategies and practices implemented to enforce security include 2-factor authentication, use of public key authentication such as the use of TLS client certificate (P. C. Faith, personal communication, May 02, 2017). The security measures also implement facilities such as dedicated link that accomplishes security parameters using virtual private networks (VPN). Other direct security utilities include the use of username and password (W. R. Elias, personal communication, June 03, 2017).

Iteration 4 Monitoring and Evaluation

Plan

Operations involving phase in action research encompasses the monitoring and evaluation of the implemented solution to ensure that they are resolving the issues identified according to professional and as effective as possible. The session involves maintaining and training the systems operators to ensure that the entire network and organization systems are secure. First week practices involve data and information assurance awareness, training, and education program. The session shall equip researchers with roles, responsibilities, duties, and functionalities that an expert in the field of IT should have (Z. C. Bred, personal communication, June 07, 2017). Researchers shall be equipped with knowledge involving responsibilities of system administrators, database administrators, network Administrators, security administrators, web administrators, and help desk administration. The awareness session shall be monitored by Mr. Bred, the security awareness officer.
Other activities shall include performing hardware and software upgrading. The session shall include installing and integrating hardware components on the security systems. Researchers shall also be required to perform software patching and vulnerability monitoring. Researchers shall be required to understand tasks such as consistent mitigation of organizational vulnerabilities (F. G. Sarah, personal communication, June 08, 2017). The operation shall be achieved through a testing and integrating patching procedures.  According to principles implemented in maintenance process mature patching and vulnerability management techniques should be implemented to allow organization by maintaining the appropriate levels of security for most of the existing organizations (F. G. Sarah, personal communication, June 08, 2017). The facilitator during the upgrading and patching operations shall be Miss Sarah, software and hardware maintenance engineer.  
Finally, another area applied in monitoring and evaluation criteria shall include being ready to assess services that assist organizations in determining effective and efficient entities that should be protected. Researchers shall evaluate entities such as people, operations, and technologies. The aim of the assessment is to meet specific security objectives that support of organizational objectives. Researchers shall implement the following assessment methods to accomplish analysis criteria technical vulnerability assessments, non-technical vulnerability assessments, as well as penetration testing (Z. C. Bred, personal communication, June 08, 2017). 

Action 

During the security awareness operations, I took part in awareness training session. The security roles and activities discussed were provided in a life-cycle approach.  The session on the creation of security awareness involved the introduction of organization designing, developing, implementing, as well as maintaining information assurance awareness based on specific needs and requirements. The maintenance training procedures included expanding the size and geographical dispersion of the organization. The entire duties include defining organizational roles and responsibilities through allocating appropriate budget as well as authority. Other activities in the session shall involve the implementation of services that combined hardware upgrading and patch automation. The session activities included installing new hard drives, huge memories, and improved processors to facilitate fast performance of systems. The session incorporated activities such as troubleshooting, repairing, and diagnosing. Activities implemented in the session involved performing preventative and maintenance operations to ensure that all organizations have the potential of spending less time, fewer resources, as well as less money on incident responses. Patching and upgrading operations management services guided us in preventing the exploitation of Information Technology vulnerabilities through improving systems performance within an organization.
Among the monitoring and evaluation operations performed included creating a patching and vulnerability analyzing systems that facilitate continuous monitoring of vulnerabilities, remediation, and threats. Other activities practiced included prioritizing patch application where phases are deployed as most appropriate (F. G. Sarah, personal communication, June 08, 2017). Evaluation process involved testing patches before deployment. Other operations included deploying enterprise-wide automated patching solutions through automating, and updating applications as needed. Through interacting with experts, we were able to analyze the results as well as translating technical and non-technical data and information. Results led to the computation of technical and non-technical mitigation recommendations which were presented in a comprehensive, detailed, and easy to read the report (Z. C. Bred, personal communication, June 12, 2017).
The network implementation included ensuring that every setting and related operations are effectively and efficiently coordinated through providing security within network systems. All connections implemented in the systems were fully integrated with Splunk tools mainly for observing, monitoring and surveying various concepts within the network. Through the assistance of Bred, I was capable of configuring networks with modern systems and incorporating alert systems in the network systems. Achievements made during the session included accomplishing all operations related to security systems especially areas concerned with multiple accounts.

Observation

Through session for monitoring and evaluation, I have acquired and developed methods and standards that apply to the creation of reliable data and information inventory of all information technology assets. I have observed that various standards that apply in maintaining information assurance. The architecture applied in study analysis includes standardization of configurations to ensure security measures information technology resources as much as possible. Through the activities analyzed included understanding and verifying that vulnerabilities have been remediated. The Splunk tools ensure that the consistent methods and methodologies applied while developing Splunk tools can consistently measure the effectiveness of the organization. The patching methodologies ensure that the vulnerability management and control can continuously be applied through corrective actions as necessary. The session involving training and application of staff on vulnerability monitoring and remediation techniques involves Periodical testing of the effectiveness of the organizational patching and vulnerability controlling of the effective and efficient operation of programming technologies. I have observed that the vulnerability mitigation techniques resources include conducting vulnerability testing, network testing, and web testing.
I observed that duties and responsibilities involving the strengthening of monitoring, inspection as well as evaluation procedures. Monitoring activities involve inspection as well as evaluation of procedures recommended through determining data analysis procedures and applying quantitative and qualitative analysis tools. An evaluation procedure involves cleaning, sorting, categorizing and organizing data. The organization of information involves developing monthly, quarterly, or annual reports. The techniques that are applied in monitoring and evaluating supervision of regular data and information through collecting and implementation of partners that ensure the quality of the data of verifying and validations of flow of data and information.  I observed that various techniques applied include investigating systems, protocols, networks traffic as well as historical time frames for security needs and requirements.
I have observed that the digital publishing technologies are highly significance especially in improving digital assets infrastructure. I have observed various techniques that facilitate monitoring and troubleshooting networks for an effective end to end asset delivering. Splunk tool is best applied in the implementation on measuring the popularity of companies, through evaluation views, social media links, and other reconciliation techniques

Reflections

       Through evaluation and monitoring, I have effectively acquired knowledge and information required for ensuring that entire analysis of resources for implementing information assurance techniques. Splunk systems guarantee effective offering of a premium solution for information security. It improves enterprise Security through Splunk ES that has the capability of supporting the advanced application of ready-to-use dashboards. The systems provide risk control and management operations. The plunk systems ensure complete implementation of governance, security operations as well as compliance operations. The technology has implemented various operations such as integrating the ability to use, creating and editing existing problems. The completed systems are complete provisions of needed flexibility for enhancing effective and efficient security assurance. The systems have accomplished support of common Information Technology (IT).  Assurance techniques involve implementation of compliance techniques, controlling and managing fraud, mitigating theft of data and information as well as preventing abuse of users through detecting attacks, malware espionage as well as preventing every form of, IT operations, service intelligence, application delivery and business analytics.
Security implementation of security teams prevention of work effectively through facilitating IT functionalities. The effective security-related applications ensure that Splunk database is completely secured from effect through pre building searches, reporting and visualizing of specific third party operations involving security vendors. The systems provide ready-to-use applications that utilize an additional provision of capabilities that range from monitoring security. Other utilities applied include the use of modern technology generation firewalls, as well as advanced treatment and control of management as well as the effective acquisition of security systems. The future implementation of Splunk systems shall ensure complete implementation of security coverage through providing the Splunk tools in business operations (F. J. Yvette, personal communication, June 30, 2017).  The research operation will ensure that all network systems as well as utilities, systems, and network utilities.
  

Summary of learning

Through research, I have acquired knowledge for allocating resources and developing mile stones for the entire project. The session has ensured that each step of the solution is matched with the appropriate resources as well as the best experts. Team leaders and modular programming methodologies have enabled me to establish mechanisms that ensure the execution of the solution and success. Supervisor of the session shall Miss. Yvette, the resource and project organization manager.The major goal learned in the study includes extracting useful data and information elements that can be used in comparing and identifying information assurance trends, root causes of analysis as well as security shortfalls.  The complete analysis the assessments, and the finding were compiled in a single report. I have observed that current systems, as well as modern business operations, have the potential of guaranteeing security analysis as well as monitoring cases involving fraud attacks through ensuring compliance issues. Through the study, I have understood that the scope of the Splunk systems covers areas such as monitoring logistics and supply chains using Radio Frequency Identification (RFID) and databases machine data. It also spans across the internet of things through controlling and managing SCADA data and information.
I have learned the entire system users should have the ability to generate information automatically from connected hardware devices, shared utilities on networks, database managers should access and link to servers, as well as have the ability to manage control and allocate Internet of Things (IoT) devices and other sources to users. Users of the system can achieve security measures through effective planning of goals, and an objective of the entire Splunk is used for analyzing machine data and information. Through entire session I have understood the goal of information assurance through providing effective and efficient insights into business application management, business operations control, managing IT operations, guaranteeing strong security and enforcing security compliance through fraud detection, threat mitigation and provision of methods of viewing threats.
The current research study focus at implementing Plunk tools in over 60 % of IT systems guarantying data scientists through facilitating the improvement of data advanced analytics. The Splunk tools ensure direct Information Technology analysis that guarantees stretched approaches in over leveraging packaging of machine learning. The machine learning procedures guarantee quick identifying of quick sources of IT intelligence. The main security expert has total catching effects on solving major insider threats. Splunk tools will ensure that user behaviors analysis procedures are implemented in developing expertise security events in monitoring and analyzing operations. Future study research analysis shall involve determining the concept and utilization of big data concepts. The research shall focus on implementing machine learning as a system that completes a radical transformation of daily lives and ensuring that entire business analytical tools respond to business operations in real time.
The significance of Plunk tools shall include bringing data analysis in real time operations through allowing business individuals perform future predictions. The tools shall be applied in monitoring trends, patterns and behaviors of customers. The major benefits within business operation shall include helping stakeholders in detecting risky incidents in business, reducing decision making and time taken to get a resolution to problems. The main objective is to predict, prevent as well as avoid undesirable outcomes. 

References


Altrichter, H., Kemmis, S., McTaggart, R., & Zuber-Skerritt, O. (2002). The concept of action research. The learning organization9(3), 125-131.
Bryman, A. & Bell, E. (2011) Business Research Methods 3rd edition, Oxford University Press
Cisco.com (2015). Security Analytics on Cisco UCS with Splunk: Improve Threat Detection and Accelerate response
Collis, J. & Hussey, R. (2003) Business Research. A Practical Guide for Undergraduate and Graduate Students 2nd edition, Palgrave Macmillan
Global Innovation Technology (2014). Network Security monitoring.
Lisa S., (2012). The Ultimate Network Monitoring Software. A Splunk primer.
Church, A. H., Rotolo, C. T., Margulies, A., Del Giudice, M. J., Ginther, N. M., Levine, R., ... & Tuller, M. D. (2015). The role of personality in organization development: A multi-level framework for applying personality to individual, team, and organizational change. In Research in organizational change and development (pp. 91-166). Emerald Group Publishing Limited.
Gupta, S. K., Yadav, N., Watts, M. S., Parandehgheibi, A., Gandham, S., Kulshreshtha, A., & Deen, K. (2016). Policy-driven compliance U.S. Patent Application No. 15/133,155
Kim, J. H., Ma, M. C., & Park, J. P. (2016). An analysis on secure coding using symbolic execution engine. Journal of Computer Virology and Hacking Techniques12(3), 177-184.
Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE security & privacy99(2), 33-42. 
Reybok, R., Haugsnes, A. S., Kurt, J. Z. I., Rhines, J., Geddes, H., Osypov, V., ... & Manning, M. (2015). Techniques for sharing network security event information U.S. Patent Application No. 14/615,202.
Splunk for IT Operations (2016). Splunk for IT Operations. Get End-to-end Visibility Across the IT Infrastructure to Find and Fix Problems Faster. 
Splunk Inc, (2016) Splunk® And The Cis Critical Security Controls. Mapping Splunk Software to the CIS 20 CSC Version 6.0. 
Wilde, M., Hategan, M., Wozniak, J. M., Clifford, B., Katz, D. S., & Foster, I. (2011). Swift: A language for distributed parallel scripting. Parallel Computing37(9), 633-652.

 Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in affordable custom research papers. If you need a similar paper you can place your order from legitimate essay writing service services. 

Comments

Popular posts from this blog

Quality academic papers

For the last ten years, we have been the preferred academic papers service company in many parts of the world ready to partner with students from all corners.

Buy Pre-Written Essay in California

We offer a pre-written essay that meets the instructions provided and observe the academic writing standards that students follow.we guarantee 100% originality.
Research Proposal Writing Service The purpose of writing research proposal services papers is to prove that issues suggested investigating are essential particular field of study.