编者按:在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述...在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业...
编者按:在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述...
在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述来证明其有足够的学术研究实力和坚实的理论基础从而进行更高深层次的学习与研究。
具体来讲,这部分的材料准备起来有一定的难度,因其专业性强,不能妄加杜撰,所以要求申请人仔细准备,不能疏忽怠慢。以下以一篇IT方面(网络安全)研究的陈述为例,在此介绍一下写作此类材料的一般过程。
通常来讲,第一步,简单介绍自己的研究方向和基本内容:
例如,
MyresearchorientationissecurityofNewGenerationNetwork(thefollowingiscalledNGNforshort)andInternetInformationExchange。
Asanopennetworkstructure,NGNallowsdifferentnetworkanddifferentdevicestojoinNGNnetwork,becauseofwhich,thenetworksecurityiseasilythreatened。Therefore,thesecurityproblemmustbesettledforNGNcarrier—Internetcarrier,whichmainlyincludeelectromagnetismsecurity,equipmentsecurity,linksecurity,end-pointsecurity,securityofnetworkbusiness,securityofnetworkresources,networksizeandequipmentcapacity,confidentialityandintegralityofinformationtransferringandtheauthenticationofuserIDandchargewiththeemergingofthesoftend-point。
第二步,提出问题:
例如,
Threat:
I。NetworkAttackonLowerLayerProtocol(e。g。TCP,UDPorSCTP),Influencingonalotofnetworkdevices
II。AttackonHigherLayerSpecificTargetProtocol(e。g。SIP,H。323,MEGACOandCOPSNGNprotocol)
Inaddition,somecommonattackssuchasrefusingtoserve,listeningin,pretendingandamendinginformationstillexist。
接着,指出自己的探索及可能解决问题的方法:
例如,
Thoughtsofrelievingthethreats:
I。NetworkDeployment
BoardAccessControllercanbeinstalledatthejointpointofInternettoprovidewithfirewallandotherprotectionfunctionsconsistingofverifyingthevalidityofdevicejoinedandpreventillegalusersfromjoining;shieldingthetopologicalstructureofinternalnetwork;NATandservicepenetration;distributionandassuranceofnetworkresources;keepingawayfromattackofservicerefusalfromthelowerandhigherlayers。
II。SafeTransmission
Inordertoavoidanunentitledentitymakinguseofcontrolinformationprotocol(H。248,MGCP,SIPandH。323)tosetupillegalcallorinterfereinlegalcall,MD5arithmeticisadoptedtoencryptandtransmitthekeyparametersandsoftswitchisusedtoauthenticatetheterminalconnectionviakeyparameters。H。248andMGCPoffersecurityprotectionforprotocoltransmissionviaIPSecprotocol,butadditionalburdenisimposedoncommunicationdevice。BymeansofencryptingRTPpackage,theusersisabletopreventthemediainformationbetweenthemfrombeingbugged。MD5canbeusedtoencrypttheusers’authenticationinformation。
Besides,tosolvetheproblemsofsecurityadministrationofinteractivesystemisfarmoreinfluentialtothenetworksecuritythantosolvethatoftechniques。
最后,多为就此问题的前景展望以及自己对这一领域的理解与预测:
例如,
Theadvancedsecuritytechniquesandequipmentwillbreakdownwithouteffectiveadministration;inthemeantime,theperfectedadministrationwoulddiminishtheunfavorablefactorsbroughtinbytheundevelopedtechniques。Henceasfornetworksecurity,theadministrationisevenmoresignificantthantechniques。Theadministrationherementionedoughttoinvolvetheadministrativesystem,theemergencysystem,regulationsforrunningandmaintaining,employees’training,keydistribution,securitysystemandsoon。