Cyber security

Assignment Instructions
Instructions:
Must be familiar with Chicago style writing .
Some knowledge about Cyber security
Turabian Title Page – For any assignment or paper I would expect some kind of title page to be included.

* Always spell out acronyms the first time.

* Internet should be capitalized. Check Turabian page 311 in the 7th edition.

* Avoid 1st Person writing: I, me

* Avoid Passive Voice: Direct-Object-Verb Subject (Photos were collected by satellites). Instead use Active Voice: Subject-Verb-Direct Object (Satellites collected photos)

*** Reminder: In the most basic format, you should have an intro, 3 supporting paragraphs/sections, and a conclusion. None of these rule are written in stone, just good guides.

Intro: 1st Sentence is a quote or stat or whatever to catch the reader’s attention. Several sentences that summarize the problem and your supporting arguments. Final sentence in the intro is your thesis statement. Make it as straightforward and obvious as possible. Keep it simple if you can. Make a claim or take a position in this sentence.

Supporting Paragraphs/Sections: First sentence is your topic sentence, again, this is a supporting reason to why your thesis statement is true. Make the support obvious in the sentence. Use the rest of the paragraph to prove and support your topic sentence…examples and citations.

Rebuttal or Counter-argument Paragraph: Some professors like you to include a paragraph where you talk about opposing points of view or counters to your thesis claim. I like this because it shows me you thought about the other side. Support them with some citations and/or examples, but then tell the reader why you do not think these are true or as important.

Conclusion: Restate your thesis statement in here and how the evidence/paragraphs support you claim. Explain what’s wrong with the counterargument. Nothing new should show up here.

I hope everyone is having a great week and I look forward to the second half of the course.

Kurt

Mobile View
Powered by Sakai(Opens in a new window)
Copyright 2003-2018 The Apereo Foundation. All rights reserved. Portions of Sakai are copyrighted by other parties as described in the Acknowledgments screen.
Build Info:
Server Time:
Users present begins here

This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives. You are to pick one and answer it in a 4-6 page essay. The assignment rubric is included for your review. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, citations, bibliography, double space, headings/subheadings, etc). You must use your class readings and you must cite your work. No exceptions.

Essay Question #1: Discuss the vulnerabilities associated with four of the ten networks described in your readings. Make sure you identify the network, potential vulnerabilities, and what the result could be from an attack against it.

Essay Question #2: Discuss how a cyber warrior can use a social networking site to gain information.

General Requirements

1. Document Format.

a. MS Word document

b. One-inch (1”) margins

c. Times New Roman font

d. Twelve (12) pitch

e. Not including your title page, this assignment should be 4-6 pages.

f. Double space, except for your bibliography’s entries.

2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.

52903_1524812652

         $10 per 275 words - Purchase Now