Information systems- sources 2 only(attached)

Anonymous
timer Asked: Jul 4th, 2018
account_balance_wallet $10

Question description

  1. Following the "sandwich technique" described in this week's required reading, post a direct quotation from one of your sources as it would appear within the body of your research paper. Be sure that you introduce your quote with a signal phrase, provide some commentary for the quote, and include the appropriate in-text citations for your documentation style. Follow the source material with closing commentary or analysis to link it to your thesis/purpose.
  2. Next, paraphrase the same quotation and use a signal phrase and closing commentary to demonstrate how the paraphrase would appear in your research paper; include an in-text citation in the documentation style you are using for your paper. Be sure to label which documentation style you are using and include the appropriate bibliography entry as the source will appear on your works cited, reference, or bibliography page. It is best to avoid large block quotes for this assignment, since the goal is to integrate the quote into your writing. Simply inserting a large, indented block quote does not necessarily demonstrate that integration skill.

Running head: INFORMATION SECURITY 1 Information Security Name Institution Professor Course Date INFORMATION SECURITY 2 First Source Source: Okenyi, P. O., & Owens, T. J. (2007). On the Anatomy of Human Hacking. Information Systems Security, 16(6), 302-314. doi:10.1080/10658980701747237 Documentation style: APA Authors: Okenyi P.O and Owens T.J Thomas J. Owens is a doctor at the Brunel University London in the college of engineering, Design, and Physical sciences. Since February 2014until March 2018, Tom was an Executive Vice President of Real Estate at Cinemark Holdings Inc. Mr. Owens is also a Coowner at Thomas J Owens and Margaret E Richards Trust. As from 1996, Mr. Owen has served in Executive positions in various companies and organizations dealing with information technology and other technological development aspects.Lastly, Owens is currently conducting a research fixated on Security and Network Security of Wireless Communications, a course he also teaches in London. Okenyi P.O. is also a doctor who has worked with SWH IT security, HSBC Technologies, Inc. Before his entry to the HSBC, Okenyi worked the Credit Suisse Asset Management New York (CSAM NY) and as a part of the IT Risk team in Credit Suisse First Boston New York (CSFB). Dr. Peter Okenyi additionally has worked as a senior security consultant for eFortresses which is located in Atlanta, Ga. eFortresses is a firm that deals with information technology Risk management whose headquarter is in Atlanta. The profiles of the two doctors described above are a clear indication that they are the best. Publisher: Taylor & Francis Group, LLC Taylor & Francis Group, LLC is an international academic publisher that is well-known and recognized with offices all over the world. The group is world-leading both academic and professional publisher that cultivates knowledge through the creation of efficient and effective partnerships with a commitment to quality. Taylor & Francis Group publishes books, journals and online articles for all academic study levels as well as professional development across a wide range of disciplines and subjects. The group’s journals are quality and peer-reviewed usually published under the Routledge and Taylor and Francis Imprints. An access program that is purely open is offered by the group’s newest part, Cogent OA. The publisher’s information and journals are available in archives that are trusted and can also be accessed through subscription databases. Accuracy The published information in the journal is not only accurate but also of high quality. The information contained in the journal has been peer-reviewed and can readily be availed or accessed from the APUS library. At the end of the journal, a list of references has been provided so that any interested parties having any doubts can confirm what has been presented by the two doctors, Okenyi and Owen. Current Information The information in the journal, pages 302-314 was published online on the 19th of December 2007. The abstract can be accessed free by anyone but to gain full access one is INFORMATION SECURITY 3 required to register so that they can access the entire document at a certain fee. The information provided was based on factual data and figures but since its publication online in 2007, it has not been updated. Objectivity Issues in the journal are treated in a fair way and there is no side that seems to have been addressed more or less than the other. The issues addressed by the two doctors address human hacking as being a type of interruption that is nontechnical and profoundly relying on the manipulation of human beings. Second source Malin, Alex. Information Systems Security. Jan2007, Vol. 16 Issue 1, p47-53. 7p. DOI: 10.1080/10658980601051490. The journal is has been peer-reviewed at APUS library. Documentation Style: APA Author: Alex Malin, CISSP. Alex Malin, CISSP is an architect in intrusion detection systems and also a manager of incident Responses for the National Laboratory of Los Alamos. Alex has a wide range of interests which include assuring the confidentiality of information through technical controls and the integration of security into various designs of networks. Alex's immense interest and confidence in these areas make him an expert in the general field of information systems. Publisher: Taylor & Francis Group, LLC. The publisher, Taylor & Francis Group, LLC commits to partner with authors that are world-class, from renown researchers, leading scientists, scholars, and professionals who operate at the top of their various fields. As a team, the group publishes in all areas of social sciences, science, behavioral science, medicine sectors, technology, and humanities.The group currently stands as among the world leading publishers of books, eBooks, textbooks, reference works and scholarly journals like this one. The group’s offices network has expanded since its formation to include numerous representatives in New York, Boca Raton, Singapore, Tokyo, Kuala Lampur, New Delhi, Johannesburg, Melbourne, and Philadelphia. The expansion has helped the group’s staff be in a position to provide expertise locally and offer editors support. Societies, authors can be offered customer service that is efficient and tailored to the company’s library colleagues all over the world. Accuracy The information provided in the journal is very accurate and corresponds with other various resources that have historically been reliable. The journal describes an architecture that is based on different zones of security. Network infrastructure devices as described by the author can add more defense layers, enforcing routing policies of inter-zones at zone borders thus preventing and detecting malicious activities propagation. INFORMATION SECURITY 4 Reliability of the information provided The information provided by Alex Malin in the journal has been peer-reviewed and contains a list of references that one can use to confirm that the provided information is correct in case of any doubts. Considering the immense experience that the author, Alex Malin, has, the information provided is factual with no errors. Current information The journal was published in Jan/Feb 2007 (pages 47-53) and has not been updated ever since. What Alex, the author, presented are facts and updating them would mean changing the truth of what is already in existence. A preview of the journal can be accessed online but the full document can only be accessed from institutions’ libraries and the APUS library upon request. Objectivity In designing networks that enforce information security policies, every side and angle has been considered with all of them being treated the same and none is more regarded than the other. Security of networks is something that long time ago was not considered as the population was less and technology had not fully been embraced. The central objective of the journal was that computer networks needed to be split into various network zones that are distinct. A point reached when network infrastructures and network security devices had to converge for a better solution. The issue of network security has been addressed fairly with all sides being keenly attended and without any bias.

Tutor Answer

EinsteintheProf
School: Cornell University

Hello, review the attached document and contact me in case you need any changes. Otherwise, good luck in your study and if you need any further help in your assignments, please let me know. Always invite me to answer your questions.Goodbye.

Running head: INFORMATION SECURITY

1

Information security
Name
Institution
Date

INFORMATION SECURITY

2
First source

Source: Okenyi, P. O., & Owens, T. J. (2007). On the Anatomy of Human Hacking. Information
Systems Security, 16(6), 302-314. doi:10.1080/10658980701747237
Documentation style: APA
Authors: Okenyi P.O and Owens T.J
Doctor Okenyi P.O. has been working with the SWH IT security, HSBC Technologies,
Inc. before his entry to the HSBC; he was working with the credit Suisse Asset managementNew York (CSAM NY). In addition he worked on a part-time basis for IT Risk team in Credit
Suisse First Bos...

flag Report DMCA
Review

Anonymous
Thanks, good work

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors