ENGL110: Making Writing Relevant
PLEASE USE THESE SOURCES:
Title: The Art of Cyber Security – A practical guide to winning the war on cyber crime
Creator: Hibberd, Gary
Title: The Cyber Security Handbook – Prepare for, Respond to and Recover from Cyber Attacks
Creator: Calder, Alan PLEASE READ WORD DOCUMENT FOR ASSIGNMENT INSTRUCTIONS
This week, you will submit an annotated bibliography for two (2) of your sources for the final project paper. Both sources should be scholarly and from the APUS Library. Read the instructions for upcoming assignments so you will have a good idea of sources you might need.
Each source (listed in alphabetical order) should have a complete Works Cited or References entry for the citation style you are using, as well as an annotation, which should be a paragraph or two summarizing and evaluating the article. Information about the author's credentials and publisher's credibility may be included. Value of the sources to the final project paper should be part of the annotation. (Summaries/evaluations under one hundred words each will be considered under-developed.)
Write in third person only. It's a good idea to include a signal phrase, direct quote or paraphrase, and a parenthetical citation within each summary.
To format your Works Cited or References entries, you may use the library cite button discussed in the week four Lessons. Include the article’s web link (the https address—not just the doi) at the end of your Works Cited entry. Just copy and paste it from your web browser, if it is not already included. Examples are shown in the attached Template (which you will download) and Sample (which is attached to show you an example of what a good submission looks like).
Submit your assignment as a Word document attached to the assignment link so it can be automatically processed through Turnitin. Use the template provided. You can save the template with a title like this: Your Name_Annotated Bib.
,
ANNOTATED BIBLIOGRAPHY 1
Annotated Bibliography
Student Name
ENGL110: Making Writing Relevant
Professor Name
Assignment Due Date
Annotated Bibliography
Complete References entry here
Paragraph summary and evaluation here (Please read all the assignment instructions word for word before you complete this task. Also, look at the sample annotated bibliography attached in this assignment area.)
Complete References entry here
Paragraph summary and evaluation here (Please read all the assignment instructions word for word before you complete this task. Also, look at the sample annotated bibliography attached in this assignment area.)
,
Cyber security
American Military University
ENGL110
Cristian DeWeese
Professor Prince
11/20/2022
1 Program I am studying:
As cybercrime becomes more popular it's on pace to account for $6 trillion in losses this year, making it more profitable than the global drug trade. This is making cybersecurity critical so that we can repel attacks to keep the organization we work for safe.
2 This is the Research Guide I am using and some of the things I found in it.
1. Networking/system admin
For a profession in cybersecurity, networking skills are essential. Learning networking will help you safeguard data by understanding its technical components. Getting CompTIA Security+ and Cisco CCNA certifications is wise.
You should also learn system management. All about configuring and managing computers. You should explore your computer's capabilities and settings and play around.
Operating systems and virtual machines knowledge
A cybersecurity practitioner must know Windows, Linux, and Mac OS well. As a cybersecurity specialist, you should know every OS. Virtual machines let you train and research in an isolated environment to improve your abilities.
Remember Kali Linux, the most popular Linux distro for ethical hacking and penetration testing. It has hundreds of tools for Penetration Testing, Malware Analysis, Security Research, and Computer Forensics.
Network security control
Network Security Control refers to the methods used to secure a network. Know how your network, routers, firewalls, and other device’s function. A firewall prevents internet traffic to or from your computer. You must use a firewall to filter and block illegal network traffic as a cybersecurity professional.
You must also know IDS, IDS, VPNs, and remote access. For example, you should run the IDS and identify security policy breaches and harmful network traffic.
FREE Class: Cyber Security
Learn cybersecurity fundamentals
4. Code
Lack of coding skills may restrict your cybersecurity options. Learn a couple coding languages.
Below is a list of coding languages you may learn to succeed in cybersecurity:
C/C++ C and C++ are low-level programming languages needed for cybersecurity.
Python is a popular high-level programming language among cyber specialists nowadays. This helps detect and address vulnerabilities.
Knowing JavaScript can avoid cross-site scripting attacks.
PHP is used to develop most websites; mastering it will assist thwart invaders.
HTML is one of the easiest languages to learn and is used by most websites.
: It's great for cryptography and cybersecurity challenges.
SQL: Attackers utilize this language to harm stored data; SQL injection is an example. It's helpful to know SQL (Structured Query Language).
Assembler helps you understand how malware works and guard against it.
5. Cloud security
Companies want employees with AWS and Azure security capabilities. Cloud infrastructure is being used to store data and execute apps. Implementing rules and technology to secure cloud-based systems and devices.
Like App Security, Cloud Security includes developing secure systems from the outset. Those with experience operating Microsoft Azure, AWS, and Google Cloud Platform are in demand.
Advanced Cybersecurity Program
IIT Bangalore and NPCIENROLL NOW
6. Blockchain security
Blockchain is gaining popularity due of its security. So, cybersecurity specialists should learn about blockchain and how it manages security. Consider it futuristic.
Blockchain might improve the security of IoT devices, network control, supply chain integration, identity control, and mobile computing.
Complexity of blockchain makes it hard to hack. For a cybercriminal to damage or destroy a blockchain, they must delete data from each user's computer linked to the global network.
The IoT 3
4. Describe things you found as you looked at an organization or website used by people in your field.
malware
Malware include spyware, ransomware, viruses, and worms. When a user clicks on a malicious link or attachment, malware is installed. Cisco says malware can:
Access essential network components (ransomware)
Add malicious software
Transmit hard disk data to steal information (spyware)
Disrupt components to make system dysfunctional
Emoted
The Cybersecurity and Infrastructure Security Agency (CISA) calls Emoted a modular banking Trojan that downloads or drops additional Trojans. Emoted is an expensive and dangerous virus.
3. DSS
A denial of service (DoS) cyberattacks floods a machine or network with requests. A distributed DoS (DDoS) accomplishes the same thing but from a network. Flood attacks are commonly used to interrupt the "handshake" and cause a DoS. Others utilize the time a network is disabled to conduct further assaults. According to Jeff Melnick of Netwrix, an IT security software business, millions of systems may be infected with malware and commanded by a hacker in a botnet. Botnets, often termed zombie systems, target and overload a target's processing. Botnets are hard to track and in multiple places.
Man in the middle
A man-in-the-middle (MITM) attack is when hackers join a two-party transaction. After disrupting communications, they may filter and take data, says Cisco. When a visitor utilizes an unprotected public Wi-Fi network, MITM attacks occur. Attackers implant malware between the visitor and the network to install software and utilize data maliciously.
4. Spam
Phishing attacks employ bogus email to deceive recipients into opening it and following instructions, such as submitting a credit card number. The purpose is to steal credit card and login information or install malware on the victim's PC, Cisco says.
6. SQLinjection
Structured Query Language (SQL) injection is a cyberattack that inserts malicious code into a SQL server. An infected server leaks data. To submit malicious code, simply type it into a susceptible website's search bar.
Password attacks
An attacker may access a plethora of data with the appropriate password. Data Insider describes social engineering as "a tactic cyber attackers utilize that depends primarily on human connection and typically entails luring individuals into breaching basic security standards." Using a password database or guessing are other password assaults.
Identify your team's cyber security awareness
You may find certain cyber security recommended practices intuitive, but others may not. 58% of Twingate workers reported discussing sensitive material on work video calls. Many individuals aren't as cyber-savvy as they assume.
As an IT manager, you must assess your team's cybersecurity knowledge. To convince your staff to listen to you (and deliver relevant suggestions), you must first discover what they know about cyber security and adjust your message accordingly.
To discover out, ask what cyber security actions they conduct. What are they not doing and why? Take attention of how your personnel talks about IT. In your messages, utilize the same terminology so people understand.
2. Communicate cyber security without technical jargon
In most situations, you'll be speaking to beginners who don't know much about cyber security, so use simple language. Otherwise, you'll lose their attention or frustrate them. In both circumstances, personnel will ignore your tips. Before sending a video, have someone who isn't in IT examine it to verify it's clear. Your prejudice may impede you from writing well, therefore a second opinion can assist. With Moovly's collaboration tool, you can share films to team members for viewing and feedback, helping you find (and improve) confusing spots.
3. Create an internal communication strategy
74% of employees say they miss corporate news owing to inadequate internal communication. When distributing time-sensitive material, like a security incident, you need a solid internal communication plan.
5. Here are tips for communicating in this field of study.
Work with your internal communications staff to simplify internal communications and make sure each employee understands how to contact IT. Make sure they know how you'll contact them in a cyber assault.
Encourage personnel to ask inquiries.
Foster an open community where workers may ask cyber security issues. Whenever feasible, mix internal messaging with Q&A. For IT Q&As, create a separate chat channel. Everyone on the channel may read your weekly replies and learn something. You may also use these questions to create cybersecurity advice videos.
References:
Alotaibi, A. (2022). Ransomware Attacks as a Cybercrime in the United States: An Exploratory Study (Doctoral dissertation, Indiana State University).
Chiu, V., & Yahya, M. A. (2022). Meme Stock Vigilantism: A Quasi-Property Rights Approach. Forthcoming Ohio State Business Law Journal, 17(1).
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.