For your capstone, you will identify an original cybersecurity problem and propose a project to address it. In later tasks, you will be asked to gather, analyze, and present data related to your research question. Your capstone proposal serves the purpose of organizing your ideas for a project so you can complete the project as efficiently as possible. To start this capstone project, you must first discuss your project ideas and potential research question with a course instructor. After you reach an agreement on your research topic, you must fill out the top portion of the attached “Cybersecurity Graduate Capstone Topic Approval Form” and send it to the course instructor. The course instructor will digitally sign your form and then lock it to prevent further changes to the document.
The capstone projects should not be based on or include any proprietary or classified information or material belonging to your employer or any other organization unless you obtain the owner’s permission to use it. Such material belongs to this third party and is referred to as “restricted information.” You must declare with a digital signature whether your capstone project is based on or includes restricted information by submitting the attached “IT Capstone Release Form.” This completed attachment also documents that you have permission from the third party to use the restricted information.