Professionalization report cyber security, writing homework help

User Generated

thyqnayby

Writing

Description

The attached PDF file contains all the information for the assignment.

Also, my field of study is in cyber security.

Unformatted Attachment Preview

WRTG 293 students, Your last writing assignment will be a professionalization report. In this assignment, you will conduct research on your field of study in order to become more aware of its professional organizations, the professional contacts available, and employment opportunities. You will write a short paper summarizing your findings. The work you complete on this assignment will provide information to you for the final assignment in the class—the cover letter and resume. Steps to Take in Completing this Assignment: 1. Locate at least one professional organization in the field or profession that you plan to pursue. One way to locate an organization of this nature is to conduct an advanced search on Google. For example, the following screen capture shows a student searching for professional organizations in cybersecurity. 2. Find out what annual or regularly scheduled conferences the organization coordinates. For example, in the field of cybersecurity, the IEEE Computer Society Technical Committee on Security and Privacy sponsors the following conference: 3. For the conference you found, access the Call for Papers section. In this section, you will probably find a list of 20-30 topics on which the organization is accepting papers for presentations. Select three topics of interest to you. 4. Locate the list of workshops or speakers from a conference held in the previous year. Peruse any documentation you find on at least two workshops, plenary talks, roundtables, or other meetings. Most conferences will post a preview of what the talk will cover, a review of what the talk discussed, or other documentation of this nature. 5. Write two to three paragraphs in which you complete the following: a. introduce the reader to the organization and conference b. summarize what topics in the Call for Papers list that interested you and why you were interested in them c. describe what main talks interested you and why you were interested in them. d. describe other new information you learned about your field of study and about this organization from this search. e. cite your sources with the websites you found that provided this information for you. Use APA documentation style when citing your sources. When writing your paragraphs, apply the skills you have learned from previous writing courses. Write a topic sentence at the beginning and support your topic sentence with major and minor details. Length: Your paper should be 500-800 words in length. Due Date: Your instructor will notify you of the due date. You will write a first draft, your instructor will comment on the first draft, and you will submit a second draft using the comments as your guide.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Thank you for working with me.

Running head: CYBER SECURITY

1

Cyber Security
Name:
Institutional affiliation

2

CYBER SECURITY

Cyber Security
Professionalization Report
The Association for Computing Machinery (ACM) is one of the international scientific
and industrial computer societies that contacts research and communication on different aspects
that relates to the broad area of computing. This is achieved by ensuring the growth of their
members through publications, conferences and career resources. ACM provides help to
organizations in the development of policy issues by determining the relevant innovations in the
computing area that are useful to the society. Moreover, ACM enhances computer research and
innovations through their annual symposiums, conferences, and journals that are publicized
periodically. For example, the ACM symposium on security track that aimed at increased
security and trustworthy in the 5G network. The main aspect of the conference was to enhance
the integrations of different devices and ensuring that security in maintained in the 5G networks.
In addition, the conference also discussed the aspects on how to set a security architecture that is
necessary for improving the security of devices that will use the 5G networks. Conducting a
piloting review on how the 5G networks will maintain the security and preventing cybercrime is
necessary and was outlined in the conference.
From the call for papers section, the study identified number topics that were of interest
to the study. The first topic that the study is interested in is cyberlaw and cybercrime. The m...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags