Emerging Threats and CounterMeasures

User Generated

wnzrf1217

Other

Description

This assignment will be one of several throughout your PhD program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you'll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.This assignment is listed on the syllabus as "Mid-term research paper" and is worth 10% of your grade.

Your paper will be an annotated bibliography, specifically focusing on the "Depth" topic (i.e. Defense in Depth) in the context of protecting National Infrastructure.

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in Depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I'm interested enough to read the paper, and also how you perceive the paper. Don't go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers. Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed - check it out.

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography...

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\

http://libguides.enc.edu/writing_basics/annotatedb... <<<< Check out the "Rules! rules! rules!" section

http://guides.library.cornell.edu/annotatedbibliog...

https://owl.english.purdue.edu/owl/resource/614/03...

Remember that this is a doctorate level course and this assignment should be treated as such.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DEFENSE IN DEPTH FOR PROTECTING NATIONAL INFRASTRUCTURE

Defense in Depth for Protecting National Infrastructure
Name
Institution

1

DEFENSE IN DEPTH FOR PROTECTING NATIONAL INFRASTRUCTURE
Defense in Depth for Protecting National Infrastructure
Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and
challenges for the 21st century. International Journal of Critical Infrastructure
Protection, 8, 53-66
Critical national infrastructures are not only important to the proper functioning of any
society through their level of performance and reliability but present immense cybersecurity
challenges for the government of several nations, especially those that are an integral part of the
cyberspace. It is this imperative that informed the investigation by Alcaraz and Zeadally (2015),
and the findings on the vulnerabilities and risks inherent in critical infrastructures were published
in this article. Also, these scholars asserted that the measures for reducing or eliminating the
adverse impacts of these threats could also be used to address some of the challenges that occur
in specific areas of the national infrastructure. As an article that analyzed some of the security
issues that are associated with the use of new technologies for the management of critical
infrastructure, its inclusion in the list of reference materials would provide the background
information on the areas in the infrastructures that need the deployment of defense in depth.
Amoroso, E. (2012). Cyber-attacks: protecting national infrastructure. Elsevier.
In this chapter of the book by Amoroso (2012), the purpose of using defense in depth to
provide additional layers of protection for the information security assets through the
enforcement of the security policy in all access points was highlighted. Also, the expertise of the
author on the elements of defense in depth was demonstrated by discussions on the schema for
the security model, factors that influence its effectiveness, layered authentication, and e-mail
virus and spam protection among other essential concepts. However, an additional rationale for
the inclusion of this chapter in the list of sources that would be used to support the ideas and

2

DEFENSE IN DEPTH FOR PROTECTING NATIONAL INFRASTRUC...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags