Order Number |
13243657679 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
OBJECTIVE & PURPOSE:
The purpose of this assignment is to help students be able to: Identify the bad actors in cyberspace, compare and contrast their resources, capabilities/techniques, motivations and aversion to risk (CTH1); Describe different types of cybersecurity attacks and their characteristics (CTH2); Describe potential system attacks and the actors that might perform them (CSF2); Describe cyber defense tools, methods, and components, as well as how to apply cyber defense methods to prepare a system to mitigate attacks (Kill Chain) (CSF3); and Understand the Federal, State, and Local Cyber Defense partners/structures/programs (ISC3)
DESCRIPTION OF THE ASSIGNMENT:
Your assignment will be to develop a written paper that will provide a summary of the following:
In particular, you will need to develop a five-page document (not more!) that outlines each of the section above and provides the details to address the points above.
FORMAT:
All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be five-pages long (not including title page, Table of Contents, & Certificate of Authorship).
The following information should also be included:
Title page:
The report should also be done professionally and should include:
Professional and appealing document is expected! As required by Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state it in your own words, or put in quotations.
This case will be graded out of 100 points. This assignment will weight 5 points of your final grade.
Does not meet standard | Nearly meets standard | Meets standard | Exceeds standard | |
Title page | Total mess, nothing is there | Few required items there | Evidence of all items, but not in a professional appearance | All required items there and look professional |
TOC page | Total mess, nothing is there | Few required items there | Evidence of all items, but not in a professional appearance | All assignment sections noted, page numbers indicated, and look professional |
Overall layout | Total mess | Few required items there | Evidence of all items, but not in a professional appearance | Assignment look highly professional |
Bad Actors in Cyberspace | Not found | Few required items there | Evidence of all items, but not in a professional appearance | Section noted professionally and with proper APA citations |
Types of Cybersecurity Attacks | Not found | Few required items there | Evidence of all items, but not in a professional appearance | Section noted highly professional with proper APA citations |
Types of System Attacks | Not found | Few required items there | Evidence of all items, but not in a professional appearance | Section noted highly professional with proper APA citations |
Cyber Defense | Not found | Few required items there | Evidence of all items, but not in a professional appearance | Section noted highly professional with proper APA citations |
Cyber Defense Partners/Structures/Programs | Not found | Few required items there | Evidence of all items, but not in a professional appearance | Section noted highly professional with proper APA citations |
Conclusion | Not found | Few required items there | Evidence of all items, but not in a professional appearance | Section noted highly professional with proper APA citations |
References | Not found | Some references appear, but not in APA | All references appear, but not fully per APA | All references appear and follow closely APA |
Certificate of Authorship | Not found | Parts of required items there | Evidence of all items, but not in a professional appearance | All required items there and in the template provided |