UCumberlands Cybersecurity Issues In Industrial Critical Infrastructure

Anonymous

Question Description

Annotated Bibliography - Depth

This assignment will be one of several throughout your PhD program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you'll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.

Your paper will be an annotated bibliography, specifically focusing on the "Depth" topic (i.e. Defense in Depth) in the context of protecting National Infrastructure or related to the topic you would like to consider for your dissertation, just examine that from an emerying threats focus

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I'm interested enough to read the paper, and also how you perceive the paper. Don't go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed - check it out.

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography...

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\

http://libguides.enc.edu/writing_basics/annotatedb... <<<< Check out the "Rules! rules! rules!" section

http://guides.library.cornell.edu/annotatedbibliog...

https://owl.english.purdue.edu/owl/resource/614/03...

Tutor Answer

ChloeL134
School: UIUC

here we goLemme know in case of anythingAll the best and Goodbye

Running Head: DEFENSE IN DEPTH

1

Annotated Bibliography Defense in Depth
Name
Course
Tutor
Date

DEFENSE IN DEPTH

2

Annotated Bibliography Defense in Depth
Ani, D.P.U, He, M. H & Tiwari, A. (2016). Review of cybersecurity issues in industrial
critical infrastructure: manufacturing in perspective. Journal of Cyber Security
Technology. Vol. 1, 2017- Issue 1. doi.org/10.1080/23742917.2016.1252211
The article provides an insight into the possible remedies to initiate the process of
understanding the security trends about vulnerabilities, attacks, agents, risks and industrial
environment. The industrial sector is facing the challenge of cybersecurity. The advancement of
technologies such as Internet-of-Things and mobile computing has increased security
vulnerabilities. Holistic and refined security strategies are, therefore, required to promote security.
The response to defense in depth can be improved by d eploying both the host and network-based
firewalls.
Coole, M, Corkill, J & Woodward, A. (2012). Defence in depth, protection in depth and security
in depth: A comparative analysis towards a common usage language. DOI:
10.4225/75/57a034ccac5cd
The article is a comparative analysis that defines the common hierarchy in security
languages to achieve a common understanding. A debate prevails on whether security should be
considered as a profession despite the wide community of professionals that ...

flag Report DMCA
Review

Anonymous
Excellent job

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors