Cyber Security

timer Asked: Oct 21st, 2018
account_balance_wallet $9.99

Question Description

Your job is to do a deep dive into the issue of Cyber Security. Come up With questions and research the answers, then draw conclusions based on your research.

The requirement you can find in the file.

This is a group project. There are two person in the group. Please complete each person's part as required.

No too professional words. No grammar issues.

please follow the requirement to finish this project.

Thank you!

Unformatted Attachment Preview

Working in groups of 2 students, choose a topic out of the current news, develop a set of questions to research, report on the research and make recommendations (persuasively) based on the conclusions drawn by your group.Get your topic approved early Research: Each person must consult 4 current sources including at least one academic journal. The other sources must be relevant, professional and in-depth : NY Times, Washington Post, Time Magazine, government websites, professional journals, websites of relevant professional organizations… blogs or brief articles. Presentation: Each group is responsible for giving an oral presentation to the class, with each individual presenter speaking for 3-5 minutes. Each person should be reporting on research. The group’s presentation should have an intro and conclusion. The recommendations should be persuasively presented. Written: Each member of the group should submit their own individual annotated bibliography (see ch. 15, pp. 190-191), providing a works cited and 1 paragraph description of the source. PowerPoints are required.Students may not simply read off the slides or off their papers. The presentations should instead by well-rehearsed and presented from outlines, with sources cited and quotes appropriately noted on slides and during presentation. ...
Purchase answer to see full attachment

Tutor Answer

School: UCLA

Will send you the work shortly. Still working on it.


Cybersecurity Annotated Bibliography
Institutional Affiliation




Guiding research questions
1. What is cyber security?
2. How does the aspect of internet of things relate to cyber security?
3. How concerned should an average citizen be in regards to cyber security?
4. What can be done to improve on the issue of cyber security?
Armstrong, D. G., Kleidermacher, D. N., Klonoff, D. C., & Slepian, M. J. (2016). Cybersecurity
regulation of wireless devices for performance and assurance in the age of “mud
jacking”. Journal of diabetes science and technology, 10(2), 435-438.

In this article, the authors evaluate the cybersecurity regulation of wireless devices in the
health and other important industries. There is a general argument that although the federal
government continues to assure citizens of the effectiveness of their legislation and regulations,
these regulations have not been quite effective to prevent a cyber-breach. Regulations such as the
Health Insurance Portability and Accountability Act (HIPAA) for healthcare, the Payment Card
Industry security standard (PCI) for financials, and the US Federal Trade Commission (FTC)
guidance on the Internet of things (IoT) have not been quite effective in protecting the citizens
from cybersecurity threats.
Mele, C. (2018). Data Breaches Keep Happening. So Why Don’t You Do Something?. Retrieved

In this article, the author exposes the aspect of a data breach that keeps of happening in
the country and little effort to counter its occurrence. In this news article, Mele (2018) exposes
the trend of cyber threat and data breach in the country that in his perspective have become



rampant and that data security and cybersecurity experts are unable to explain instead, they are
throwing up their hands in defeat. Companies such as Under Armour, Yahoo, and Timehop
application have reported data breach that did expose not only their customer’s information but
also rendered their reputation in despair. In this article, the author recommends users to ensure
they undertake stable validation of their passwords and that developing strong passwords with
three-factor authentication could help protect the passwords further.
Dawson, M. (2018). A Brief Review of New Threats and Countermeasures in Digital Crime and
Cyber Terrorism. In Cyber Security and Threats: Concepts, Methodologies, Tools, and
Applications (pp. 173-180). IGI Global.

In this article, Dawson (2018) provides an essential review of the new threats of
cybersecurity and countermeasure in the context of digital crime and cyber terrorism. The author
agrees to the fact that cybersecurity has become the cornerstone of national security policies in
many states and countries around the world. The aspect of cybersecurity continues to draw the
attention of many stakeholders including government entities, utilities, energy markets,
regulators, and other stakeholders who have vested interest and wishes to exploit the cyber
infrastructure. The cybersecurity has become challenging to enhance due to the existence of a
variety of new tools and te...

flag Report DMCA

Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors