Chat with us, powered by LiveChat ENGL110: Making Writing Relevant - EssayAbode

ENGL110: Making Writing Relevant

PLEASE USE THESE SOURCES:

Title: The Art of Cyber Security – A practical guide to winning the war on cyber crime

Creator: Hibberd, Gary

Title: The Cyber Security Handbook – Prepare for, Respond to and Recover from Cyber Attacks

Creator: Calder, Alan PLEASE READ WORD DOCUMENT FOR ASSIGNMENT INSTRUCTIONS

This week, you will submit an annotated bibliography for two (2) of your sources for the final project paper. Both sources should be scholarly and from the APUS Library. Read the instructions for upcoming assignments so you will have a good idea of sources you might need.   

Each source (listed in alphabetical order) should have a complete Works Cited or References entry for the citation style you are using, as well as an annotation, which should be a paragraph or two summarizing and evaluating the article.  Information about the author's credentials and publisher's credibility may be included. Value of the sources to the final project paper should be part of the annotation. (Summaries/evaluations under one hundred words each will be considered under-developed.)  

Write in third person only. It's a good idea to include a signal phrase, direct quote  or paraphrase, and a parenthetical citation within each summary.  

To format your Works Cited or References entries, you may use the library cite button discussed in the week four Lessons. Include the article’s web link (the https address—not just the doi) at the end of your Works Cited entry. Just copy and paste it from your web browser, if it is not already included. Examples are shown in the attached Template (which you will download) and Sample (which is attached to show you an example of what a good submission looks like).   

Submit your assignment as a Word document attached to the assignment link so it can be automatically processed through Turnitin. Use the template provided. You can save the template with a title like this: Your Name_Annotated Bib. 

,

ANNOTATED BIBLIOGRAPHY 1

Annotated Bibliography

Student Name

ENGL110: Making Writing Relevant

Professor Name

Assignment Due Date

Annotated Bibliography

Complete References entry here

Paragraph summary and evaluation here (Please read all the assignment instructions word for word before you complete this task. Also, look at the sample annotated bibliography attached in this assignment area.)

Complete References entry here

Paragraph summary and evaluation here (Please read all the assignment instructions word for word before you complete this task. Also, look at the sample annotated bibliography attached in this assignment area.)

,

Cyber security

American Military University

ENGL110

Cristian DeWeese

Professor Prince

11/20/2022

1 Program I am studying:

As cybercrime becomes more popular it's on pace to account for $6 trillion in losses this year, making it more profitable than the global drug trade. This is making cybersecurity critical so that we can repel attacks to keep the organization we work for safe.

2 This is the Research Guide I am using and some of the things I found in it.

1. Networking/system admin

For a profession in cybersecurity, networking skills are essential. Learning networking will help you safeguard data by understanding its technical components. Getting CompTIA Security+ and Cisco CCNA certifications is wise.

You should also learn system management. All about configuring and managing computers. You should explore your computer's capabilities and settings and play around.

Operating systems and virtual machines knowledge

A cybersecurity practitioner must know Windows, Linux, and Mac OS well. As a cybersecurity specialist, you should know every OS. Virtual machines let you train and research in an isolated environment to improve your abilities.

Remember Kali Linux, the most popular Linux distro for ethical hacking and penetration testing. It has hundreds of tools for Penetration Testing, Malware Analysis, Security Research, and Computer Forensics.

Network security control

Network Security Control refers to the methods used to secure a network. Know how your network, routers, firewalls, and other device’s function. A firewall prevents internet traffic to or from your computer. You must use a firewall to filter and block illegal network traffic as a cybersecurity professional.

You must also know IDS, IDS, VPNs, and remote access. For example, you should run the IDS and identify security policy breaches and harmful network traffic.

FREE Class: Cyber Security

Learn cybersecurity fundamentals

4. Code

Lack of coding skills may restrict your cybersecurity options. Learn a couple coding languages.

Below is a list of coding languages you may learn to succeed in cybersecurity:

C/C++ C and C++ are low-level programming languages needed for cybersecurity.

Python is a popular high-level programming language among cyber specialists nowadays. This helps detect and address vulnerabilities.

Knowing JavaScript can avoid cross-site scripting attacks.

PHP is used to develop most websites; mastering it will assist thwart invaders.

HTML is one of the easiest languages to learn and is used by most websites.

: It's great for cryptography and cybersecurity challenges.

SQL: Attackers utilize this language to harm stored data; SQL injection is an example. It's helpful to know SQL (Structured Query Language).

Assembler helps you understand how malware works and guard against it.

5. Cloud security

Companies want employees with AWS and Azure security capabilities. Cloud infrastructure is being used to store data and execute apps. Implementing rules and technology to secure cloud-based systems and devices.

Like App Security, Cloud Security includes developing secure systems from the outset. Those with experience operating Microsoft Azure, AWS, and Google Cloud Platform are in demand.

Advanced Cybersecurity Program

IIT Bangalore and NPCIENROLL NOW

6. Blockchain security

Blockchain is gaining popularity due of its security. So, cybersecurity specialists should learn about blockchain and how it manages security. Consider it futuristic.

Blockchain might improve the security of IoT devices, network control, supply chain integration, identity control, and mobile computing.

Complexity of blockchain makes it hard to hack. For a cybercriminal to damage or destroy a blockchain, they must delete data from each user's computer linked to the global network.

The IoT 3

3 https://owl.purdue.edu/owl/research_and_citation/conducting_research/evaluating_sources_of_information/evaluating_digital_sources.html

4. Describe things you found as you looked at an organization or website used by people in your field.

malware

Malware include spyware, ransomware, viruses, and worms. When a user clicks on a malicious link or attachment, malware is installed. Cisco says malware can:

Access essential network components (ransomware)

Add malicious software

Transmit hard disk data to steal information (spyware)

Disrupt components to make system dysfunctional

Emoted

The Cybersecurity and Infrastructure Security Agency (CISA) calls Emoted a modular banking Trojan that downloads or drops additional Trojans. Emoted is an expensive and dangerous virus.

3. DSS

A denial of service (DoS) cyberattacks floods a machine or network with requests. A distributed DoS (DDoS) accomplishes the same thing but from a network. Flood attacks are commonly used to interrupt the "handshake" and cause a DoS. Others utilize the time a network is disabled to conduct further assaults. According to Jeff Melnick of Netwrix, an IT security software business, millions of systems may be infected with malware and commanded by a hacker in a botnet. Botnets, often termed zombie systems, target and overload a target's processing. Botnets are hard to track and in multiple places.

Man in the middle

A man-in-the-middle (MITM) attack is when hackers join a two-party transaction. After disrupting communications, they may filter and take data, says Cisco. When a visitor utilizes an unprotected public Wi-Fi network, MITM attacks occur. Attackers implant malware between the visitor and the network to install software and utilize data maliciously.

4. Spam

Phishing attacks employ bogus email to deceive recipients into opening it and following instructions, such as submitting a credit card number. The purpose is to steal credit card and login information or install malware on the victim's PC, Cisco says.

6. SQLinjection

Structured Query Language (SQL) injection is a cyberattack that inserts malicious code into a SQL server. An infected server leaks data. To submit malicious code, simply type it into a susceptible website's search bar.

Password attacks

An attacker may access a plethora of data with the appropriate password. Data Insider describes social engineering as "a tactic cyber attackers utilize that depends primarily on human connection and typically entails luring individuals into breaching basic security standards." Using a password database or guessing are other password assaults.

Identify your team's cyber security awareness

You may find certain cyber security recommended practices intuitive, but others may not. 58% of Twingate workers reported discussing sensitive material on work video calls. Many individuals aren't as cyber-savvy as they assume.

As an IT manager, you must assess your team's cybersecurity knowledge. To convince your staff to listen to you (and deliver relevant suggestions), you must first discover what they know about cyber security and adjust your message accordingly.

To discover out, ask what cyber security actions they conduct. What are they not doing and why? Take attention of how your personnel talks about IT. In your messages, utilize the same terminology so people understand.

2. Communicate cyber security without technical jargon

In most situations, you'll be speaking to beginners who don't know much about cyber security, so use simple language. Otherwise, you'll lose their attention or frustrate them. In both circumstances, personnel will ignore your tips. Before sending a video, have someone who isn't in IT examine it to verify it's clear. Your prejudice may impede you from writing well, therefore a second opinion can assist. With Moovly's collaboration tool, you can share films to team members for viewing and feedback, helping you find (and improve) confusing spots.

3. Create an internal communication strategy

74% of employees say they miss corporate news owing to inadequate internal communication. When distributing time-sensitive material, like a security incident, you need a solid internal communication plan.

5. Here are tips for communicating in this field of study.

Work with your internal communications staff to simplify internal communications and make sure each employee understands how to contact IT. Make sure they know how you'll contact them in a cyber assault.

Encourage personnel to ask inquiries.

Foster an open community where workers may ask cyber security issues. Whenever feasible, mix internal messaging with Q&A. For IT Q&As, create a separate chat channel. Everyone on the channel may read your weekly replies and learn something. You may also use these questions to create cybersecurity advice videos.

References:

Alotaibi, A. (2022). Ransomware Attacks as a Cybercrime in the United States: An Exploratory Study (Doctoral dissertation, Indiana State University).

Chiu, V., & Yahya, M. A. (2022). Meme Stock Vigilantism: A Quasi-Property Rights Approach. Forthcoming Ohio State Business Law Journal, 17(1).

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing