Description
This assignment will be one of several throughout your PhD program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you'll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.
This assignment is listed on the syllabus as "Mid-term research paper" and is worth 20% of your grade. Your paper will be an annotated bibliography, specifically focusing on implementing Enterprise Risk Management (ERM). Choose a "theme" (i.e. ERM in higher education, manufacturing., etc.), and make sure that all your resources relate to your theme.
You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:
1) Be current. Published within the last few years.
2) Be peer-reviewed.
3) Relate directly to Defense in depth in the context of protecting National Infrastructure.
Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I'm interested enough to read the paper, and also how you perceive the paper. Don't go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.
Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed - check it out.
Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)
https://sites.umuc.edu/library/libhow/bibliography...
https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\
http://libguides.enc.edu/writing_basics/annotatedb... <<<< Check out the "Rules! rules! rules!" section

Explanation & Answer

Attached.
Running Head: ENTERPRISE RISK MANAGEMENT
Defense in Depth in the Context of Protecting National Critical Infrastructure
Student’s Name
Institutional Affiliation
Date
Instructor’s Name
1
ENTERPRISE RISK MANAGEMENT
2
Albanese, M., & Jajodia, S. (2019). Proactive Defense Through Deception. In Industrial
Control Systems Security and Resiliency (pp. 169-202). Springer, Cham.
This article reviews how attackers target certain systems in the national infrastructure by
acquiring accurate knowledge about the systems. According to the authors, service fingerprinting
has been used by cyber attackers to obtain information about the target systems. The article
provides a solution to this problem by suggesting a graph-based approach to manipulate the
responses to the attacker. The article focuses on a proactive defense through a technique they
term as deception. This article offers the reader with a comprehensive solution that involves
generating traffic similar to that of the target systems to manipulate the hacker. This article is
informative and provides a deep understanding of researchers in this category.
Boughton, N. (2019). Protecting infrastructure from cyber attacks. Network
Security, 2019(4), 18-19.
Boughton offers a comprehensive approach to protect national infrastructure by analyzing
the national cybersecurity of the United Kingdom. The article focuses on the latest defense
strategi...
