skip to Main Content
The smarter way
to do assignments.

Please note that this is just a preview of a school assignment posted on our website by one of our clients. If you need assistance with this question too, please click on the Order button at the bottom of the page to get started.

The first part of the assignment is a request for topic approval for your Week Four Signature Assignment Research Paper The second part is the actual Research paper. You may choose any of the suggested topics provided in the first section. The first part of the assignment: In Week Two, please submit your request for topic approval for your Week Four Signature Assignment Research Paper. A list of suggested topics is at the end of this section or you may develop your own topic. Provide a rational/justification for your choice of topic in one to two paragraphs and include examples of the types of resources/research you will consult and use in your final report. Topic submission is worth 50 points. Signature Assignment Directions for the Final Report Due in Week Four: For the Signature Assignment, each student will prepare a research paper, which will be worth 250 points (25 percent of the total course grade), exploring the case study or topic that was submitted in Week Two. Given the importance of information security, students will conduct research and write a consolidated, thematic essay on the selected case study or topic: Describing the historical approaches and techniques hackers use to gain access, privileges, and control of information systems. Analyzing and identifying potential vulnerabilities, and specific counter measures. Synthesizing and recognizing security concerns that have potential to turn into catastrophes. Evaluating the proactive measures as well as the legal, technological, and policy aspects of information security. You must base and support your report using external research, the course textbook, and supplemental course materials. Your external research must be reliable and authoritative, preferably from peer-reviewed (refereed) publications. You must include a minimum of five (5) course-external references. The final report must provide complete and equitable treatment of all issues. Address all of the issues in a consolidated way, making linkages between the issues where appropriate and logical. Your external research should be integrated to provide logical support for your consolidated examination of the fundamental ideas being expressed. All submissions must include the following technical components: A cover or title page with your name on it. Labeled topical headings (e.g., Introduction, Discussion, Conclusion, Recommendations, etc.). Length: The report must contain a body of text of between 1,750 to 2,000 typed words (about 7 to 8 pages double-spaced). A reference page containing a minimum of five (5) course-external resources used and cited in the report. References cited at the end of the report must be cited in text to illustrate how they were used. Written in APA Style. Please review the Grading Rubric (linked below) to understand how your assignment will be assessed and ask questions if you do not understand any of it. Students are expected to prepare new, original work for all written assignments. Do not use or reuse previously submitted work. SafeAssign is used to compare submitted assignments to a large database of published material, including assignments submitted by students in previous National University courses. Using previously submitted assignments without substantial additions or enhancements to the original work may be considered plagiarism and result in reduced or failing grades. Please review the SafeAssign informational unit provided in the course website to familiarize yourself with the tool. Questions about assignments may be referred to the instructor. Suggested Topics: Hacking and Related Case Studies Human Engineering Case Studies Viruses and related Case Studies Financial Theft Case Studies A comparative analysis of threats to information security Cyber-attack case studies and examples Case Study on actual training exercises aimed at enhancing information security systems Information Security Threats to the US Department of Defense Information Security Threats to Corporations Information Security Threats to Law Enforcement The Emergency Response Management Cycle with a Focus on mitigating information security threats Protocol Models for responding to a Cyber Attack National Response Plan Federal Government Involvement in developing an Infrastructure to eradicate cyber-threats US Department of Defense’s role in countering cyber threats FBI’s role in countering cyber threats Any other professor approved topics that are course – topic related. The second part and final paper: For the Signature Assignment, each student will prepare a research paper, which will be worth 250 points (25 percent of the total course grade), exploring the case study or topic that was submitted in Week Two. Given the importance of information security, students will conduct research and write a consolidated, thematic essay on the selected case study or topic: Describing the historical approaches and techniques hackers use to gain access, privileges, and control of information systems. Analyzing and identifying potential vulnerabilities, and specific counter measures. Synthesizing and recognizing security concerns that have potential to turn into catastrophes. Evaluating the proactive measures as well as the legal, technological, and policy aspects of information security. You must base and support your report using external research, the course textbook, and supplemental course materials. Your external research must be reliable and authoritative, preferably from peer-reviewed (refereed) publications. You must include a minimum of five (5) course-external references. The final report must provide complete and equitable treatment of all issues. Address all of the issues in a consolidated way, making linkages between the issues where appropriate and logical. Your external research should be integrated to provide logical support for your consolidated examination of the fundamental ideas being expressed. All submissions must include the following technical components: A cover or title page with your name on it. Labeled topical headings (e.g., Introduction, Discussion, Conclusion, Recommendations, etc.). Length: The report must contain a body of text of between 1,750 to 2,000 typed words (about 7 to 8 pages double-spaced). A reference page containing a minimum of five (5) course-external resources used and cited in the report. References cited at the end of the report must be cited in text to illustrate how they were used. Written in APA Style. Please review the Grading Rubric (linked below) to understand how your assignment will be assessed and ask questions if you do not understand any of it. Students are expected to prepare new, original work for all written assignments. Do not use or reuse previously submitted work. SafeAssign is used to compare submitted assignments to a large database of published material, including assignments submitted by students in previous National University courses. Using previously submitted assignments without substantial additions or enhancements to the original work may be considered plagiarism and result in reduced or failing grades. Please review the SafeAssign informational unit provided in the course website to familiarize yourself with the tool. Questions about assignments may be referred to the instructor.

GET HELP WITH THIS ASSIGNMENT TODAY

Clicking on this button will take you to our custom assignment page. Here you can fill out all the additional details for this particular paper (grading rubric, academic style, number of sources etc), after which your paper will get assigned to a course-specific writer. If you have any issues/concerns, please don't hesitate to contact our live support team or email us right away.

How It Works        |        About Us       |       Contact Us

© 2018 | Intelli Essays Homework Service®

Back To Top