document analysis revision suggestions

235 views 6 pages ~ 1609 words Print

The conclusions of a research study are summarized in all four articles. Three articles summarize the findings of a research study two articles summarize the findings of a research study three articles summarize the findings of a research study two articles summarize the findings of a research study one article summarizes the findings of a research study no articles summarize the findings of a research study Score and Feedback see the columns to the right 10 points 8 points 7 points 6 points 0 points The document has the following items Excellent Good Fair Needs improvement Does not pass Score and Feedback Author and title of each article 10 points 8 points 7 points 6 points 0 points key terms for each article (at least 5 for each) 10 points 8 points 7 points 6 points 0 points a summary of the focus of the study 15 points 12 points 10 points 9 points 0 points a summary of the conclusion of the authors 20 points 16 points 14 points 12 points 0 points a personal reflection as indicated in the assignment instructions 15 points 12 points 10 points 9 points 0 points the document demonstrates accurate grammar and punctuation Excellent Good Fair Needs improvement Does not pass Score and Feedback sentence accuracy 5 points 4 points 3 points 2 points 1 point word-level accuracy 5 points 4 points 3 points 2 points 1 point punctuation 5 points 4 points 3 points 2 points 1 point Overall Score Excellent

90 or more Good

80 or more Fair

70 or more Needs Improvement

60 or more Not passing

0 or more Score and Feedback Overall score will be calculated when all criteria have been assessed.

Article #1:

Michael, Kenney; “Cyber-Terrorism in a Post-Stuxnet World.” Orbis, 59(1), pp.111-128. From the Foreign Policy Research Institute. Winter 2015. https://doi.org/10.1016/j.orbis.2014.11.009

The key terms in the article include Cyber-terrorism, cyber-war, hacktivism, cyber-attack, disruptive, destructive

Focus of study: This can be 3-4 sentences.

The focus of the article is on cyber-terrorism. The author details the differences between cyber-attack, cyber-warfare, hacktivism, and cyber-terrorism. To avoid the confusion that often arises between the terms, the author features realistic examples of each of the terms in the article.

Conclusions of the author(s): This can be 1-2 sentences.

Cyber threats is a contemporary issue that every individual must be aware of especially with the advancement of modern technology. Attacks of all kinds will still happen. The type of attack can get dictated by damage caused by the assault, the desired target, and the attacker’s motivation and intention.

Your observations of what you learned about your topic from this article and from this research study. Please write 100-150 words for each article.

From the article, I observed that the United States is not ignorant of the fact that other countries might conceive the intention of causing harm to her critical computer systems. In an October 11, 2012 speech, Defense Secretary Leon Panetta spoke about the potential cyber-attacks against the United States. I learned that there are many types of cyber-attacks and the type of attack is determined by what the attacker hopes to gain, the intended target, and the damage caused by the attack. I also learnt that cyber-war refers to a cyber-attacks that involve several nations. In the examples provided in the article, the accused countries often deny the claims raised by the attacked country. A hacktivist uses a computer to attack for a particular agenda such as social, economic or political causes. Cyber-terrorists mainly use computers as a recruitment tool and would more than likely stick to convention methods of war on their targets.

Article #2

John, Green; ”Staying ahead of cyber-attacks.” Network Security, 2015(2), pp.13-16, February 2015. https://doi.org/10.1016/S1353-4858(15)30007-6

Key terms in the article (list at least 5 terms):

The key terms in the article include Cyber-criminals, breach, threats, cybercrime, and cyber-attacks.

Focus of study: This can be 3-4 sentences.

The focus of the study was to convey that as companies shift the marketing and selling of their products and services online, they put them at risk of getting attacked. The article also focuses on the numerous types of cyber threats that businesses face in their quest to move services online. The author also delves into the monetary cost that cyber-crime can cost companies, especially those that fail to institute appropriate measures to secure their systems against cyber-attacks.

Conclusions of the author(s): This can be 1-2 sentences.

Online services are a part of the techniques modern day businesses use in conducting their businesses. Cyber-attacks come from both external and internal sources.

Your observations of what you learned about your topic from this article and from this research study. Please write 100-150 words for each article.

I observed that the cyber-crime threats are unfortunately a part of doing business in the contemporary business world. Such threats originate from both external and internal forces. The most dangerous of them all are insider threats. These include cases of employees trying to circumvent the security policies for malicious intent. Also, the article recommends that security professionals need to be cognizant of the dangers of users with weak passwords, users losing their work phone and mistakenly downloading malware using company computers. External threat includes hackers attacking a company’s system to steal sensitive data for financial gain, and attacks that can limit the transactions of legitimate businesses and services. It is a cat and mouse game between attackers and cyber defense professionals. Cyber defense professional must be able to mitigate threats as soon as possible to lessen their impacts on businesses and other security systems.

Article #3

Cătălin-Ionuț, Nastasiu. ”Cyber Security Strategies in the Internet Era.” Scientific Research and Education in the Air Force-Afases, 2016. http://www.afahc.ro/ro/afases/2016/SOCIO/NASTASIU.pdf (Accessed June 7th 2017)

Key terms in the article (list at least 5 terms):

The key terms in the article include Cyber terrorism, cyber-attacks, cyberspace, security, cyber security, cyber defense.

Focus of study: This can be 3-4 sentences.

The focus of the study was to convey that cyber security is a real threat in the Internet age. A threat real enough to warrant talks at NATO summits. A fundamental strategy must be put in place to protect vital computer infrastructure and services that rely on the Internet for delivery and transactions.

Conclusions of the author(s): This can be 1-2 sentences.

More and more government and commercial resources have been shifted online with the advancement in modern technology. Investments must be made to protect these products or services from vulnerable cyber-attackers.

Your observations of what you learned about your topic from this article and from this research study. Please write 100-150 words for each article.

I observed that cyber-attackers are capable of reaching an intended target anywhere in the world, especially if such target has not put in place mechanism to prevent the attack. The tools attackers use in carrying out the attacks get complex even as technology gets sophisticated. Governments and businesses alike are becoming more and more dependent on the use of cyberspace. Boundaries do not bind cyberspace; therefore, all connected devices can become a potential target. Defense against cyber-warfare and cyber-terrorism became a topic of conversation for many administrations. Cyber defense became a subject of discussion at several N.A.T.O. summits. N.A.T.O. developed a fund Ukraine’s network defense, with Romania willing to implement and support the initiative. Romania’s strategy was to have minimum standards for cyber security infrastructure and to invest in systems and programs.

Article #4

Monica, Lagazio, Nazneed, Sherif, and Mike, Cushman; ”A multi-level approach to understanding the impact of cybercrime on the financial sector.” Computers & Security, 45 (2014), pp. 58-74 https://doi.org/10.1016/j.cose.2014.05.006

Key terms in the article (list at least 5 terms):

The key terms in the article are Cybercrime, Economic impact, financial sector, system dynamics, loop diagram.

Focus of study: This can be 3-4 sentences.

The focus of the survey was to convey the impact of Cybercrime on the financial sector. Multiple factors determine the type of attack. Attacks can lead to many unintended consequences; financial reverberations being part of these consequences.

Conclusions of the author(s): This can be 1-2 sentences.

Online services are an embedded part of today’s financial businesses. These services must get safeguarded from any form of attack; otherwise, lack of protection will become a costly mistake for the concerned parties. The consequences of inadequate protection are not only to the bottom line but also to the brand equity.

Your observations of what you learned about your topic from this article and from this research study. Please write 100-150 words for each article.

From the article, I learnt that companies offering financial services must have an online presence since this is a significant development in today’s society. With this being a fact, there are groups of individuals who would like nothing more than to take your money or prevent you from accessing it. There are many types of attacks that can enable them to achieve this goal. The companies must come up with a strategy that balances security and availability. Companies have to invest in cyber security to protect their assets smartly. The policies and procedures must be able to adapt and shift in all areas to meet the challenge of protecting their networks from possible attacks.

References

Cătălin-Ionuț, Nastasiu. ”Cyber Security Strategies in the Internet Era.” Scientific Research and Education in the Air Force-Afases, 2016. http://www.afahc.ro/ro/afases/2016/SOCIO/NASTASIU.pdf (Accessed June 7th 2017)

John, Green; ”Staying ahead of cyber-attacks.” Network Security, 2015(2), pp.13-16 February 2015. https://doi.org/10.1016/S1353-4858(15)30007-6

Michael, Kenney; ”Cyber-Terrorism in a Post-Stuxnet World.” Orbis, 59(1), pp.111-128. From the Foreign Policy Research Institute. Winter 2015. https://doi.org/10.1016/j.orbis.2014.11.009

Monica, Lagazio, Nazneed, Sherif, and Mike, Cushman; ”A multi-level approach to understanding the impact of cybercrime on the financial sector.” Computers & Security, 45 (2014), pp. 58-74 https://doi.org/10.1016/j.cose.2014.05.006

May 02, 2023
Category:

Life Education

Subcategory:

Experience Learning

Subject area:

Problems Research Study

Number of pages

6

Number of words

1609

Downloads:

41

Writer #

Rate:

4.1

Expertise Study
Verified writer

Nixxy is accurate and fun to cooperate with. I have never tried online services before, but Nixxy is worth it alone because she helps you to feel confident as you share your task and ask for help. Amazing service!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro