Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Module 8 Assignment 1 Final Research Paper

Module 8 Assignment 1

Q This paper will build on the work done the previous modules, and it should focus on a cybersecurity challenge affecting national security. The previous module assignments allowed you to build a number of resources and portions of the project so that, as you complete this assignment, you are not writing a 5-6 page paper from scratch in one week, but building on your previous work with added insights, analysis and an overall synthesis of ideas, themes and theories into a cohesive whole. The final project will pull together all the previous module topics that focused on the learning outcomes for this course. The module learning outcomes addressed by this activity: • Conduct and present research on cybersecurity issues. (CO #5) Create a 5-6 page paper applying discipline theories and what you have learned to current issues in cybersecurity within the context of the National Security profession. The topic will be the one approved by the instructor following Module 1. Approach the paper as if you are writing a background paper to inform a senior executive in your organization about the selected topic. You are trying to inform the executive about the threat and the risk it poses to your organization. It is not enough for a professional to merely identify a problem, make a recommendation for action that will improve the organization’s cybersecurity posture. Starting with the outline developed for Module 5 and the feedback provided by the instructor, create a refined outline to organize your work and structure the paper so the paragraphs work together to build a cohesive argument and support your conclusions and recommendations The outline is for your use and will not be submitted with the final paper. The paper should use at least 5 sources. These sources should be scholarly articles and government documents, but in a dynamic field such as cybersecurity, a few of the sources you cite may be news stories or gray literature. The sources identified in your annotated bibliographies submitted in Modules 2 and 3 may be used as well as other materials you identified during the course. The Excelsior Online Writing Lab (Links to an external site.) is an excellent resource to assist you in this process. Guidelines: • 5--6 pages plus bibliography • APA Formatting Guidelines (follow these for font, indents, margins, bibliographic references and, most importantly, the citations within the text of the body of your paper!) • Use 12 point font. For assistance with your writing projects, visit Excelsior College Library. It is important to cite your sources properly when you are writing a research paper (Links to an external site.) and using someone else’s ideas. By citing sources, you will avoid plagiarism (Links to an external site.) and give credit to the originator of an idea. The resources (Links to an external site.) cover documenting sources in-text and in a list of references. Use the EC Library resources for research assistance and to properly cite your work: • Military Leadership Research Guide (Links to an external site.) • National Security Research Guide (Links to an external site.) • Plagiarism & Copyright (Links to an external site.) • Excelsior Library Writing Help (Links to an external site.) • APA Citation Help (Links to an external site.) • Excelsior College Online Writing Lab (OWL) (Links to an external site.) Additionally, I recommend Smarthinking, a free tutorial service available to you from your student toolbar. If you plan to use this service, please be sure to use this service as early as possible so that you will have the opportunity to incorporate feedback into your final paper before making your on-time submission during Module 8. Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. For those assignments that are not written essays and require uploading images or PowerPoint slides, please follow uploading guidelines provided by your instructor. Check your work and correct any spelling or grammatical errors. When you are ready to submit your work, click “Upload Submission.” Enter the submission title and then click on “Select a file to upload.” Browse your computer, and select your file. Click “Open” and verify the correct file name has appeared next to Submission File. Click on “Continue.” Confirm submission is correct and then click on “Accept Submission & Save.” Turnitin This course has Turnitin fully integrated into the course dropbox. This means that you should only submit your assignments to the dropbox below. Please do not submit your assignment directly to Turnitin.com. Once submitted, your assignment will be evaluated by Turnitin® automatically. You will be able to view an Originality Report within minutes of your first submission that will show how much of your work has been identified as similar to other sources such as websites, textbooks, or other student papers. Use your Originality Report as a learning tool to identify areas of your assignment that you may not have cited appropriately. You may resubmit your assignment through this dropbox as many times as you need to check to see if you have made improvements, until the due date of the assignment. However, once you have made your first submission, you will need to wait 24 hours after each subsequent submission to receive a new Originality Report. Plan accordingly as you draft your assignment. Once the due date has passed, your assignment submission will be considered final. Evaluation This assignment will be graded using the SPS Default Undergrad Writing Rubric located on the Course Rubrics page within the Start Here section of the course. Please review the rubric prior to beginning your work so that you ensure your submission meets the criteria in place for this assignment. This assignment is worth 40% of your final course grade.

View Related Questions

Solution Preview

Cybersecurity symbolizes the cornerstone of success for the digital and virtual world controlled by the American government. Therefore, the threats like insider threats and other kinds of dangers can never be continued to disturb the virtual lives of the citizens. The policy of cybersecurity (which has sometimes made it vulnerable for the American cybersecurity system) has to be examined for developing a thorough response. The reasons for cyber-threats to America will be analyzed in this paper. There will be some specific cases of cyber-attacks examined like the case of The Shadow Brokers and the Snowden case.