student security user risk: medium
Wazuh Security Monitoring Research Project Generator
Instructs the model to act as a Postgraduate Cybersecurity Researcher and produce a comprehensive research project titled 'Security Monitoring with Wazuh,' structured across five c…
- Policy sensitive
- Human review
PROMPT
Act as a Postgraduate Cybersecurity Researcher. You are tasked with producing a comprehensive research project titled "Security Monitoring with Wazuh." Your project must adhere to the following structure and requirements: ### Chapter One: Introduction - **Background of the Study**: Provide context about security monitoring in information systems. - **Statement of the Research Problem**: Clearly define the problem addressed by the study. - **Aim and Objectives of the Study**: Outline what the research aims to achieve. - **Research Questions**: List the key questions guiding the research. - **Scope of the Study**: Describe the study's boundaries. - **Significance of the Study**: Explain the importance of the research. ### Chapter Two: Literature Review and Theoretical Framework - **Concept of Security Monitoring**: Discuss security monitoring in modern information systems. - **Overview of Wazuh**: Analyze Wazuh as a security monitoring platform. - **Review of Related Studies**: Examine empirical and theoretical studies. - **Theoretical Framework**: Discuss models like defense-in-depth, SIEM/XDR. - **Research Gaps**: Identify gaps in the current research. ### Chapter Three: Research Methodology - **Research Design**: Describe your research design. - **Study Environment and Tools**: Explain the environment and tools used. - **Data Collection Methods**: Detail how data will be collected. - **Data Analysis Techniques**: Describe how data will be analyzed. ### Chapter Four: Data Presentation and Analysis - **Presentation of Data**: Present the collected data. - **Analysis of Security Events**: Analyze events and alerts from Wazuh. - **Results and Findings**: Discuss findings aligned with objectives. - **Initial Discussion**: Provide an initial discussion of the findings. ### Chapter Five: Conclusion and Recommendations - **Summary of the Study**: Summarize key aspects of the study. - **Conclusions**: Draw conclusions from your findings. - **Recommendations**: Offer recommendations based on results. - **Future Research**: Suggest areas for further study. ### Writing and Academic Standards - Maintain a formal, scholarly tone throughout the project. - Apply critical analysis and ensure methodological clarity. - Use credible sources with proper citations. - Include tables and figures to support your analysis where appropriate. This research project must demonstrate critical analysis, methodological rigor, and practical evaluation of Wazuh as a security monitoring solution.
ROLES & RULES
Role assignments
- Act as a Postgraduate Cybersecurity Researcher.
- Maintain a formal, scholarly tone throughout the project.
- Apply critical analysis and ensure methodological clarity.
- Use credible sources with proper citations.
- Include tables and figures to support your analysis where appropriate.
EXPECTED OUTPUT
- Format
- markdown
- Schema
- markdown_sections · Chapter One: Introduction, Background of the Study, Statement of the Research Problem, Aim and Objectives of the Study, Research Questions, Scope of the Study, Significance of the Study, Chapter Two: Literature Review and Theoretical Framework, Concept of Security Monitoring, Overview of Wazuh, Review of Related Studies, Theoretical Framework, Research Gaps, Chapter Three: Research Methodology, Research Design, Study Environment and Tools, Data Collection Methods, Data Analysis Techniques, Chapter Four: Data Presentation and Analysis, Presentation of Data, Analysis of Security Events, Results and Findings, Initial Discussion, Chapter Five: Conclusion and Recommendations, Summary of the Study, Conclusions, Recommendations, Future Research
- Constraints
-
- follow exact five-chapter structure
- formal scholarly tone
- critical analysis
- methodological rigor
- credible sources with citations
- include tables and figures where appropriate
SUCCESS CRITERIA
- Produce a comprehensive research project titled "Security Monitoring with Wazuh."
- Adhere to the specified chapter structure and requirements
- Demonstrate critical analysis, methodological rigor, and practical evaluation of Wazuh as a security monitoring solution
FAILURE MODES
- May deviate from the mandatory chapter structure
- Might lack formal scholarly tone or critical analysis
- Could use non-credible sources or improper citations
- May omit tables and figures where appropriate
CAVEATS
- Missing context
-
- Approximate length or word count per chapter
- Number of required citations or sources
- Output format (e.g., Markdown, LaTeX)
QUALITY
- OVERALL
- 0.75
- CLARITY
- 0.95
- SPECIFICITY
- 0.95
- REUSABILITY
- 0.25
- COMPLETENESS
- 0.85
IMPROVEMENT SUGGESTIONS
- Introduce placeholders like {tool_name} instead of hardcoding 'Wazuh' to improve reusability.
- Add guidance on generating realistic sample data, tables, figures, and citations for Chapters Three and Four.
- Specify evaluation criteria for 'critical analysis and methodological rigor' with examples.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR STUDENT
- MBBS High-Yield Surgery Notes Generatorstudentmedical
- Personalized Subject Learning Plan Generatorstudenteducation
- Feynman-Style Topic Mastery Educatorstudenteducation
- Layered Coding Concept Explainerstudenteducation
- 7-Day Ultra-Learning Immersion Protocol Designerstudenteducation
- Academic Research Writing Assistantstudentresearch
- Tiered Analogy Explainer for Complex Topicsstudenteducation
- Beginner Android Studio Development Guidestudenteducation
- Lecture Transcript Study Notes Generatorstudenteducation
- PhD Scientific Paper Editing Assistantstudentwriting