WRTG112 Maryland Cyber Crime Cyber Security & Internet Protocols Paper

User Generated

CnrZhXnWbr

Humanities

WRTG112

University of Maryland University College

Description

Write an essay using evidence to support a thesis that addresses your research question examining a current issue or event in the news from the perspective of your field of study. The audience is people who are generally educated but do not have extensive knowledge of your field.

Length: At least 2000 words

Sources: Minimum of 6. At least 3 of these must be from scholarly journals, and all sources should be selected based on reliability, currency, and level of information/analysis. The UMUC library will be very useful in helping you find appropriate sources. You can, but do not have to, include all of the sources from your annotated bibliography.

Due date and revision: The first draft of the research essay is due by the end of Week 5. Submit your draft as an attachment (Microsoft Word is preferred) to this assignment folder. This should be as complete a draft as possible, in order to receive the most helpful feedback. In working on your draft, you may want to look at the rubric that will ultimately be used to grade your final essay. You can see it when viewing these instructions through the Assignments area of the classroom.

During Week 6, you will receive feedback on your draft.

You will then revise your essay and submit it by the end of Week 7 to the folder "Assignment 3: Research Essay, revised draft." This version will be graded using the rubric and will count for 30% of your course grade.

Your instructor may or may not complete the rubric for your first draft, but only the grade on your revised essay will count toward your course grade.

Outcomes you should achieve by completing this assignment

The outcomes for this assignment are listed below, with the associated course outcomes in parentheses:

Use research to write an essay that will inform or persuade an audience (Course outcome 1)

Form unified, coherent, and well-supported paragraphs in support of the thesis statement (Course outcome 2)

Select sources, use them to inform and support your writing, and document them in APA style (Course outcome 4)

Demonstrate accurate grammar and mechanics in writing (Course outcome 3)

Participate in the process of receiving feedback and revising your writing (Course outcome 1)

Topic

This essay is the culmination of your research project, in which you are examining a current issue or event in the news from the perspective of your field of study. Before drafting your essay, you will have chosen a topic, developed a research question, and identified several potential sources in an annotated bibliography. You should write on the same topic for this essay, unless your professor has asked you to make changes to your topic.

Organizing and supporting your essay

As you write your essay, be sure to include the following:

an engaging introductory paragraph that includes an effective and clear thesis statement

any definition of terms or background information that your reader is likely to need to understand your paper

unified, supported, and coherent body paragraphs that defend the thesis

an effective conclusion

Research is a key element of this paper. Take care to support your claims with research throughout the paper. Include APA in-text citations whenever you use sources, whether through quote, paraphrase, or summary. An APA reference list at the end of the paper should list all of the sources cited in the text of the paper.

Point of view

This essay will be written in an academic style. Use third person point of view. Do not use “I” or “you.”

Formatting your assignment

Incorporate these elements of APA style:

Use one-inch margins.

Double space.

Use an easy-to-read font between 10-point and 12-point.

Include a title page with the title of your paper, your name, and the name of your school.

Reference Outline

  1. Ashford, W. (2019, April 26). Top lessons from cyber attacks. Retrieved from https://www.computerweekly.com/news/252462314/Top-...
  2. Fuller, C. J. (2018). The Roots of the United States’ Cyber (In)Security*. Diplomatic History,43(1), 157-185. doi:10.1093/dh/dhy038
  3. Kovács, L. (2018). National Cyber Security as the Cornerstone of National Security. Land Forces Academy Review, 23(2), 113-120. doi:10.2478/raft-2018-0013

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CYBER SECURITY

1

Cyber Security
Name
Professor
Course
Date

CYBER SECURITY

2
Cyber Security

Thesis statement: Therefore, to understand the issue of cybersecurity, we shall analyze the
topics of cyber crime, cyber security, internet protocols, the role of social media in cyber
security, and some basic steps that an entity and individual can take to improve their cyber
security.
I.

Discussion
A. Cyber Crime
B. Cyber Security
C. Internet Protocols
D. Social Media and Cyber Security
E. Improving Cyber Security

II.

Conclusion


Running head: CYBER SECURITY

1

Cyber Security
Name
Professor
Course
Date

CYBER SECURITY

2
Cyber Security

Introduction
Modern technology is enabling people to send messages across different geographical
backgrounds at the press of a button. As an infrastructure, the internet is also one of the fastest
growing environments. As such, there are many gaps that are left unattended to in terms of the
security of communication. People are increasingly unable to secure their information in a secure
manner. This is also the case for commercial enterprises that have a majority of their transactions
conducted online. Some of the latest technologies that are highly vulnerable are cloud
computing, electronic commerce, and internet banking. Therefore, to understand the issue of
cybersecurity, we shall analyze the topics of cybercrime, cyber security, internet protocols, the
role of social media in cybersecurity, and some basic steps that an entity and individual can take
to improve their cybersecurity.

Discussion
Cyber Crime
Cyber Crime is a rising issue in the field of information technology. Cybercrime can be
defined as any illegal activity using the computer and its related infrastructure and technology as
a primary tool to commit fraud (Broadhurst et al., 2014). Additionally, any crime that uses a
computer as a storage device of evidence is also considered to be a cybercrime. Some more
practical lists of cybercrimes include the dissemination of computer viruses and network
intrusions. There are more malicious acts that are considered to be cybercrimes. These acts
include the hacking of people's accounts to access private information, especially on social media
sites.

CYBER SECURITY

3

Cybercrime to a layman can include various activities. These activities include the
impersonation of a person to commit crimes on the internet. This is a form of crime where people
purport to be someone that they are not. On social media, people often engage in communication
as the centerpiece. The use of social media has seen the rise of bullying. This bullying is better
known as cyberbullying. Cyberbullying is where people use social media to belittle people, insult
them, and engage in other abusive practices. Using a computer or cyber space to threaten a
person is also a form of cyberbullying. To add, sexual harassment on social media and hate
speech are o...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags