write a 6 scholarly articles and 4 popular articles on Mobile Threat Defense, management homework help

User Generated

pngurevar0459

Business Finance

Description

Please use attached 6scholarly articles and 4 other popular articles. 6 scholarly articles is mandatory while writing the assignment. I have attached 6 scholarly articles out of which use 6 articles to complete and 4 popular articles of your choice. I attached sample paper in the below

I need references with the links

Must and should follow the Sample Paper

Topic: Mobile Threat Defense

Design a research question(s) about the topic selected formed as quantitative or qualitative.

Share why this topic and research question is important for you.

Present your review of the literature related to your topic. Apply critical thinking as you write at a synthesis level what you learned from the sources of knowledge reviewed. Aim for three themes drawn from the literature.

You should include a minimum of 10-12 reputable sources, including academic, industry, and business publications. (Academic sources include juried journal articles.) Books may also be used if they are written by relatively well-known authors.

Use APA 6th standard to format paper, e.g., titles, spacing, citations, and references. Double-spaced, consistent font throughout paper, 12 font size

Unformatted Attachment Preview

CYBER SECURITY- PRIORITIZING VULNERABILITIES Cyber Security Srikanth Reddy Challagonda Course Number: 714 MBA 510 Managerial Res Meth Design Instructor: Joel Schuessler 03/19/2017 1 CYBER SECURITY- PRIORITIZING VULNERABILITIES 2 Research Topic Title Rationale for Research Cyber security grabs my attention because it is one of the challenging task and adds lot of value to the confidentiality of the organization. Adding to this any organization has to have a strong wall to its data as it is sensitive and lead to loss of business if exposed to external forces. I believe that my strength on Analysis will help me in researching the topic and finding ways to provide new alternatives. Research Question How do you score and prioritize vulnerabilities in your network for remediation? CYBER SECURITY- PRIORITIZING VULNERABILITIES 3 Research . Researching on one of the emerging topics like cyber security is quite interesting and challenging too. However this topic is well explained in multiple articles and that can help me in researching. Using the three Level 2 subheadings as shown in the examples below, identify keywords and reference. In one paragraph, under the reference, summarize the article in your own words (use paraphrasing and personal insight or experience, but for this assignment do not directly quote from the article). Reference Number One Keywords searched: Cyber Security Niv, Ahituv (2001). Thoughts on the open information society: Modelling Cyber Security. Retrieved from http://site.ebrary.com.ezproxy.csp.edu/lib/cusp/reader.action?docID=10375700n This article focuses on organizations rather than individuals. It explains why an open information society is in evitable and how this stage of social development has been reached. It mainly focuses on how the open data can be protected or is it safe to have the data open Reference Number Two Keywords searched: Cyber Security Vulnerability Malik Javvad (2017). AWS Vulnerability Scanning. An Automated and Purpose-built Vulnerability Scanner for CYBER SECURITY- PRIORITIZING VULNERABILITIES 4 Your AWS Cloud Environment. Retrieved from https://www.alienvault.com/solutions/awsvulnerability-scanning This article explains how AWS scanner can protect your AWS cloud environment. This means that while Amazon physically secures its cloud infrastructure, the customer is responsible for securing their applications and data. Achieving security in the AWS cloud requires diligent monitoring of your AWS environment to identify changes that can leave your assets vulnerable to exploit. Reference Number Three Keywords searched: Agile and Scrum master Dorairaj, S., Siva Dorairaj, & James Noble. (2013, October 1). Understanding how agile teams manage knowledge in global software development. Science international. 25(4). 1103 - ?. Retrieved from http://kx7vz9ac8f.search.serialssolutions.com/?ctx_ver=Z39.882004&ctx_enc=info%3Aofi%2Fenc%3AUTF8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Ak ev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=UNDERSTANDING+HOW+AGILE+TEA MS+MANAGE+KNOWLEDGE+IN+GLOBAL+SOFTWARE+DEVELOPMENT&rft.jtitle=Sci ence+International&rft.au=Siva+Dorairaj&rft.au=James+Noble&rft.date=2013-0101&rft.pub=AsiaNet+Pakistan+%28Pvt%29+Ltd&rft.issn=10135316&rft.spage=1103&rft.externalDocID=3404158651¶mdict=en-US This article was fascinating because it feeds into my desire to work on global virtual teams. It touches on many important aspects of effective communication when dealing globally. In particular, it focuses on face to face interactions and frequent communication and collaboration among team members. CYBER SECURITY- PRIORITIZING VULNERABILITIES The added discussion of Knowledge Management (KM) is also interesting. I look forward to elaborating with my narrative in the paper. KM involves knowledge creation and knowledge acquisition. The researchers point out that knowledge is largely dependent on who receives the message -- something I have discussed with classmates and teammates at my workplace in Hyderabad. 5 CYBER SECURITY- PRIORITIZING VULNERABILITIES 6 References (Reference format examples for a book, journal, and website article) Author, A. A. (Year of publication). Title of book: Capital letter also for subtitle. Location: Publisher. Author, A. A. (Year of publication). Title of article: Capital letter also for subtitle. Journal Name. Volume#(Issue#). p. # - #. Author, A. A. (Year of publication). Title of article: Capital letter also for subtitle. Retrieved from https://url. Dorairaj, S., Siva Dorairaj, & James Noble. (2013, October 1). Understanding how agile teams manage knowledge in global software development. Science international. 25(4). 1103 ?. Retrieved from http://search.proquest.com.ezproxy.csp.edu/docview/1431923513?pqorigsite=summon Hummel, M., Rosenkranz, C., & Holten, R. (2013). The role of communication in agile systems development: An analysis of the state of the art. Business & Information Systems Engineering, 5(5), 343-355. Retrieved from http://search.proquest.com.ezproxy.csp.edu/docview/885149967?pq-origsite=summon Sharp, J. H., & Ryan, S. D. (2011). Global agile team configuration. Journal of Strategic Innovation and Sustainability, 7(1), 120. Retrieved from http://kx7vz9ac8f.search.serialssolutions.com/?ctx_ver=Z39.882004&ctx_enc=info%3Aofi%2Fenc%3AUTF8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Ak ev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=UNDERSTANDING+HOW+AGILE+TEA MS+MANAGE+KNOWLEDGE+IN+GLOBAL+SOFTWARE+DEVELOPMENT&rft.jtitle=Sci CYBER SECURITY- PRIORITIZING VULNERABILITIES ence+International&rft.au=Siva+Dorairaj&rft.au=James+Noble&rft.date=2013-0101&rft.pub=AsiaNet+Pakistan+%28Pvt%29+Ltd&rft.issn=10135316&rft.spage=1103&rft.externalDocID=3404158651¶mdict=en-US 7
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: MOBILE THREAT DEFENSE

Mobile Threat Defense
Srikanth Reddy Challagonda
Course Number: 714 MBA 510 Managerial Res Meth Design
Instructor: Joel Schuessler
03/19/2017

1

MOBILE THREAT DEFENSE

2
Research Topic Title
Rationale for Research

Mobile Threat Defense has captured my attention in that it aims to detect threats to
operating systems, devices, apps on the devices, as well as the networks they use. In fact, each
and every one of the vectors can be vulnerable to a number of techniques. However, a number of
Mobile Threat Defence (MTD) providers, such as Zimperium ensure that all facets within the
device are covered in a single platform.
Research Question
How important is Mobile Threat Defense?
Research
Conducting research in one of the rising issues such as Mobile Threat defense is not only
fascinating but challenging. However, this issue is well elaborated in a number of articles that
will assist me in doing research.
Reference Number One
Keywords searched: Mobile threat, transposable elements.
Konkel, M.K, Batzer, M.A. (2010). A mobile threat to genome stability: The impact of non-LTR
retrotransposons upon the human genome. M.K. Konkel, M.A. Batzer / Seminars in Cancer
Biology 20 (2010) 211–221
This article focuses on the genome stability that is brought about by mobile threat. It
reviews how the transposable elements (non-LTR retrotransposons in this case), has on the
stability of the genomes. It also shows how this type of transposable element has the potential of
mobilizing the human genome, and subsequently trigger genome instability by insertion, as well
as post-insertion based mutagenesis.

MOBILE THREAT DEFENSE

3

Reference Number Two
Keywords searched: Threats, mobile networks
Mavoungou, S et al. (2016). Survey on Threats and Attacks on Mobile Networks. Special
Section On Security In Wireless Communications And Networking. Digital Object Identifier
10.1109/ACCESS.2016.2601009.
This article explains how mobile networks have evolved overtime and has resulted in the
emergence of new threats and vulnerabilities. It also illustrates how these threats and vulnerabilities can be
...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags