Biometric security
Security Paper Instructions and Grading Rubric
You are to write a research essay on an approved computer security or privacy topic (see page 3 for a list of approved topics). Your essay must include a work cited page for any information that you find from at least three sources (your book can count for one source). If you choose to use internet sources, they must be cited correctly. The specifications for the paper are listed below. All essays will be run through a plagiarism checking software. If any portion of your paper is copied directly from an internet source or copied from another student, I will take action as deemed appropriate according to the Academic Dishonesty portion of your syllabus.
• You can submit the paper only once
• No late papers will be accepted
• The paper must be submitted in a Word, pdf, or GoogleDoc format
Word Document – Written Essay
• Length: Must be at least 3 full pages but no more than 6 NOT including the cover page and works cited page (that mean at least 3 pages of written text).
• References: You should have at least 3 sources and they need to be referenced according to APA rules.
• Title page: Your header will appear on the first page only (cover page) in the upper-left header and contain the words “Running head: TITLE OF YOUR PAPER”. Following pages will only contain the title of your paper in the upper-left section of the header. The page number should appear in the right section of the header and not appear on the first page. In addition, the title should appear centered horizontally and vertically on the page. The title should be your own unique name for your paper, not just the topic of the essay. Under the title you should have your name and the name of the college.
• Font: Times New Roman, 12pt.
• Spacing: Double spaced, with no extra spacing between paragraphs
• Margins: All margins set to 1”
• Works Cited Page: This page should appear on a page of its own at the end of the
essay. No separate document or file will be accepted.
• No abstract is needed for this paper.
The formatting of this paper follows general APA formatting. If you need further information on how to set up a research paper using APA format you can go to: Purdue University Online Writing Lab-General APA Guidelines (opens new window)
Grading Rubric:
Length Title Page
Title of Paper Font
Spacing Headers Margins Works Cited
Content
0 pts
Length less than 1 page
0 pts
0 pts
Title meets none of the requirements
0 pts
Font meets none of the requirements
0 pts
Spacing meets none of the requirements 0 pts
Headers meet none of the requirements 0 pts
Margins meet none of the requirements 0 pts
0 pts
5 pts
Length between 1-3 pages
3 pts
2 pts
Title meets some of the requirements
1 pt
Font meets some of the requirements
2 pts
Spacing meets some of the requirements 1 pt
Headers meet some of the requirements 1 pt
Margins meet some of the requirements 5 pts
1-19 pts
10 pts
Length is between 4- 6 pages
5 pts
3 pts
Title meets all of the requirements
2 pts
Font meets all requirements
5 pts
Spacing meets all requirements
3 pts
Headers meet all requirements
2 pts
Margins meet all requirements
10 pts
20 pts
Elements
Beginning
Developing
Exemplary
Cover page meets none of the requirements
Cover page meets some requirements
Cover page meets all requirements
No works cited
1-2 references and meets some of the requirements
3 or more references and cited properly
Content meets none of the requirements
Content meets some requirements or is poorly written
Content is well- written and contains meaningful content related to the topic
Approved Topics
Below is a list of approved topics for your security paper. If you would like to write about another topic on computer security, please email your instructor prior to writing the paper for approval. Unapproved topics will receive a grade of zero (0).
1. Ransomware: What is it? Examples and prevention.
2. What security vulnerabilities does Bluetooth technology pose/
3. How does encryption help computer and network security?
4. Biometric security
5. Describe at least 4 measures that help make passwords more secure, e.g. length,
complexity, one-way hash, lockout, frequency of change, pepper, etc.
6. What is two-factor authentication?
7. Tips to making secure financial transactions online and preventing financial fraud
8. Social engineering: what is it? Examples and prevention
9. Safe use of consumer devices such as baby monitors, voice-activated devices, etc.
10. Phishing: What is it? Examples and prevention.
11. How do patches and updates prevent hacking?
12. Review 3 top antivirus software packages
13. Describe the security concept of “layers of defense”.
14. Describe the security concept of “CIA Triad”.
15. Are computer keyboards and webcam vulnerable to computer attacks? If so, how and
what can be done to reduce the vulnerability.
16. Describe 3 of the most damaging and widely publicized incidents of hacking that
resulted in the theft of personal data and/or financial loss.
17. Describe 3 methods to secure your home network.
18. Describe 3 current U.S. laws related to computer security
19. Describe a honeypot or honeynet.
20. Rootkit. What is it? Examples and prevention.
21. Scareware. What is it? Examples and prevention.
22. Describe DoS and DDoS attacks.
23. Describe the role of computer and data backups in security and 3 good methods of
completing backups.
24. Describe a data breach and what companies can do to prevent it.
25. White hat and black hat hackers: who are they?
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
