Given the importance of information security, students will conduct research

Given the importance of information security, students will conduct research and write a consolidated, thematic essay on the  selected case study or topic: Describe the historical approaches and techniques hackers use to gain access, privileges, and control of information systems.

Given the importance of information security students will conduct research

For the Capstone Assignment, each student will prepare a research paper, which will be worth 400 points, exploring the  case study or topic that  was submitted in Week Two.

Given the importance of information security, students will conduct research and write a consolidated, thematic essay on the  selected case study or topic:

Firstly, Describe the historical approaches and techniques hackers use to gain access, privileges, and control of information systems.

Secondly, Analyze and identify  potential vulnerabilities, and specific counter measures.

Thirdly, Synthesize and recognize security concerns that have potential to turn into catastrophes.

Fourthly, Evaluate the proactive measures as well as the legal, technological, and policy aspects of information security.

You must base and support your report using  external research, the course textbook, and supplemental course materials. Your external research must be reliable and authoritative, preferably from peer-reviewed (refereed) publications. You must also include a minimum of five (5) course-external references.

The final report must provide complete and equitable treatment of all  issues. Address all of the issues in a consolidated way, making linkages between the issues where appropriate and logical.

All submissions must include the following technical components:

A cover or title page with your name on it.

Labeled topical headings (e.g., Introduction, Discussion, Conclusion, Recommendations, etc.).

Length: The report must contain a body of text of between 1,750 to 2,000  typed words.

A reference page containing a minimum of five (5) course-external resources used and cited in the report.

References cite d at the end of the report must be cited in text to illustrate how they were use d.

Written in APA Style.

Please review the Grading Rubric (linked below) to understand how your assignment will be assessed and ask questions if you do not understand any of it. Students are expected to prepare new, original work for all written assignments. Do not use or reuse previously submitted work.

SafeAssign is use to compare submitted assignments to a large database of published material, including assignments submit by students in previous National University courses. Using previously submit assignments without substantial additions or enhancements to the original work may be consider plagiarism and result in reduce or failing grades. Please review the SafeAssign informational unit provided in the course website to familiarize yourself with the tool. Questions about assignments may be refer red to the instructor.

TO SUBMIT: Click on the above link:   “Capestone Assignment Research Paper”

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *