UCumberlands Cybersecurity Issues In Industrial Critical Infrastructure

User Generated

newhanop

Writing

University of cumberlands

Description

Annotated Bibliography - Depth

This assignment will be one of several throughout your PhD program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you'll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.

Your paper will be an annotated bibliography, specifically focusing on the "Depth" topic (i.e. Defense in Depth) in the context of protecting National Infrastructure or related to the topic you would like to consider for your dissertation, just examine that from an emerying threats focus

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I'm interested enough to read the paper, and also how you perceive the paper. Don't go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed - check it out.

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography...

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\

http://libguides.enc.edu/writing_basics/annotatedb... <<<< Check out the "Rules! rules! rules!" section

http://guides.library.cornell.edu/annotatedbibliog...

https://owl.english.purdue.edu/owl/resource/614/03...

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

here we goLemme know in case of anythingAll the best and Goodbye

Running Head: DEFENSE IN DEPTH

1

Annotated Bibliography Defense in Depth
Name
Course
Tutor
Date

DEFENSE IN DEPTH

2

Annotated Bibliography Defense in Depth
Ani, D.P.U, He, M. H & Tiwari, A. (2016). Review of cybersecurity issues in industrial
critical infrastructure: manufacturing in perspective. Journal of Cyber Security
Technology. Vol. 1, 2017- Issue 1. doi.org/10.1080/23742917.2016.1252211
The article provides an insight into the possible remedies to initiate the process of
understanding the security trends about vulnerabilities, attacks, agents, risks and industrial
environment. The industrial sector is facing the challenge of cybersecurity. The advancement of
technologies such as Internet-of-Things and mobile computing has increased security
vulnerabilities. Holistic and refined security strategies are, therefore, required to promote security.
The response to defense in depth can be improved by d eploying both the host and network-based
firewalls.
Coole, M, Corkill, J & Woodward, A. (2012). Defence in depth, protection in depth and security
in depth: A comparative analysis towards a common usage language. DOI:
10.4225/75/57a034ccac5cd
The article is a comparative analysis that defines the common hierarchy in security
languages to achieve a common understanding. A debate prevails on whether security should be
considered as a profession despite the wide community of professionals that ...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags