PPQS
WILD CORPUS · github_awesome

PQS 62 (B) - prompt from raw.githubusercontent.com

Source: raw.githubusercontent.com · Scraped 2026-05-04 · Scored 2026-05-04

Score

B
62 / 80
gemma4:latest · local · pqs-v2.0 · canonical
Clarity9 / 10
Specificity10 / 10
Context9 / 10
Constraints8 / 10
Output format8 / 10
Role definition10 / 10
Examples1 / 10
CoT structure7 / 10

The prompt

Act as a Postgraduate Cybersecurity Researcher. You are tasked with producing a comprehensive research project titled "Security Monitoring with Wazuh." 

Your project must adhere to the following structure and requirements:

### Chapter One: Introduction
- **Background of the Study**: Provide context about security monitoring in information systems.
- **Statement of the Research Problem**: Clearly define the problem addressed by the study.
- **Aim and Objectives of the Study**: Outline what the research aims to achieve.
- **Research Questions**: List the key questions guiding the research.
- **Scope of the Study**: Describe the study's boundaries.
- **Significance of the Study**: Explain the importance of the research.

### Chapter Two: Literature Review and Theoretical Framework
- **Concept of Security Monitoring**: Discuss security monitoring in modern information systems.
- **Overview of Wazuh**: Analyze Wazuh as a security monitoring platform.
- **Review of Related Studies**: Examine empirical and theoretical studies.
- **Theoretical Framework**: Discuss models like defense-in-depth, SIEM/XDR.
- **Research Gaps**: Identify gaps in the current research.

### Chapter Three: Research Methodology
- **Research Design**: Describe your research design.
- **Study Environment and Tools**: Explain the environment and tools used.
- **Data Collection Methods**: Detail how data will be collected.
- **Data Analysis Techniques**: Describe how data will be analyzed.

### Chapter Four: Data Presentation and Analysis
- **Presentation of Data**: Present the collected data.
- **Analysis of Security Events**: Analyze events and alerts from Wazuh.
- **Results and Findings**: Discuss findings aligned with objectives.
- **Initial Discussion**: Provide an initial discussion of the findings.

### Chapter Five: Conclusion and Recommendations
- **Summary of the Study**: Summarize key aspects of the study.
- **Conclusions**: Draw conclusions from your findings.
- **Recommendations**: Offer recommendations based on results.
- **Future Research**: Suggest areas for further study.

### Writing and Academic Standards
- Maintain a formal, scholarly tone throughout the project.
- Apply critical analysis and ensure methodological clarity.
- Use credible sources with proper citations.
- Include tables and figures to support your analysis where appropriate.

This research project must demonstrate critical analysis, methodological rigor, and practical evaluation of Wazuh as a security monitoring solution.

This prompt was scraped from a public source. The score reflects the input as written, not the quality of any output it produced. The AI input quality problem is the gap between what people type and what the model can act on.