The Research Paper: will provide you with an opportunity to learn more about

  
The Research Paper: will provide you with an opportunity to learn more about a topic of particular interest regarding information security systems. The technical focus and level of research for the chosen topic must be well planned and researched. With that in mind, be sure to choose a focused topic to ensure in-depth research.
The Research Paper:  will allow exposure to technical literature for exploration of the body of research as a whole, as well as practice navigating your way around it. Thus, a well-written paper will show your ability not only to research, but also to communicate via the written word. How well your document conforms to the required form and format will demonstrate your attention to detail and instruction.
Instructions
Each Research Paper:  must:
· Have a length of 2750–3250 words (Note: the word count does not include words used in figures, tables, diagrams, or the bibliography)
· Be formatted according to current APA standards including:
o A properly formatted APA Title Page including paper name, institution, class name and paper date. 
o A Proper Title Page Header (Running Head: First 40 Characters of the paper title) and the page number (on the FIRST page).
o The name of the paper and page number on each additional page (no Running Head).
o Section Headers (i.e. First Level Headers) which are bold and centered
o Indented paragraphs for each paragraph.
o No contractions or use of personal pronouns such as “You, me, your” (except in the Conclusions page)
o Proper APA formatted in-text citations and Bibliography
· Include figures, tables, or diagrams, where appropriate (Note: the words in the figures, tables, or diagrams are not part of the word count)
· Include an in-text citation whenever the source to which you refer is changed
· Attribute quotes to the source obtained, but quotes may not make up a significant portion of the body of the text
· Include at least 5 sources for citation, 2 of which must be peer-reviewed journals. 
· Use an in-text citation to support any opinion that is not otherwise known as a ‘fact’ by your audience or by the general public. 
o For example, if you state: “…all IT Systems should be reviewed yearly as a best practice…” you need to support that with a citation. Such as ‘According to (source), “all IT systems should be reviewed yearly…”
o As a graduate student, you are not yet considered an expert in your field but are striving to become one by your degree. 
o If your statement is a known fact such as “Computers are designed for processing electronic information” or “IT Security is important” then you do not need to cite as your audience will likely agree that this is a fact.
o When in doubt, cite! J
 
Each Research Paper:  must include these 4 sections in this order as the ‘first level sections’:
1. Research Objectives:
What specifically do you want to learn about or prove as you do this research? 
a. List the research topics that you included as at least 3–4 bullets in the Research Paper: Topic Proposal and Outline at the top of this section. This list is to appear as the first section in your Research Paper:  
b. After placing your bulleted list on the Research Paper: , you must now explain those bullet points as separate paragraphs placed directly after the complete list rather than inline with your list.
c. For each bullet in the list above, devote a paragraph or two to the research topic to provide detailed information about that topic Including your research sources. (Note: your Research Paper:  must be very focused to allow in-depth research in so few words) and remember to include biblical integration as you are able.
d. The research topics are stated as bullets in this first section to help sharpen your focus and hopefully ensure that focus is maintained as the Research Paper:  develops. But are only to serve as a guide for your paragraphs.
 
2. Literature Search Results:
What do other academic sources say about this subject? 
a. This section will show the depth of your research. 
b. All entries in your bibliography must be cited at least once in this section. 
c. When detailing your literature search results, each declarative idea/concept (not each sentence) must be cited. You are stating other authors’ ideas and concepts and must provide the source from which they come. 
d. Remember to link the results to Christian concepts via biblical integration.
e. Often this is the largest section of the Research Paper:  The time to state your own ideas will come in the following section.
3. Conclusions:
What have you learned from your research? 
1. The purpose of this section is not simply to reiterate the previous sections, but for some thoughtful reflection. Now is the time to state your own conclusions. Don’t forget to provide biblical integration on the topics when you state your conclusions. 
2. In this section, each of the specific research questions you selected in the Research Paper: Topic Proposal and Outline must be restated and directly answered, even if the conclusion for an objective is uncertain. Doing so will help ensure that you have addressed all your original research questions. This, however, does not mean you are limited in this section to only answering your initial research questions. More often than not, your research will open new lines of thought that should be discussed. 
3. Most poor grades are earned because this section does not include your conclusions, but only repeats data from the previous sections.
4. Bibliography:
1. Your bibliography section must show at least 5 sources you cited from with a minimum of two (2) peer-reviewed journals as sources. 
2. Both the in-text citations and the accompanying bibliographic information must be in current APA format. 
3. You must cite professionally edited, peer-reviewed sources. You are permitted to use webpages ONLY as secondary sources that support the aforementioned peer reviewed sources. 
4. Do not cite the course texts, encyclopedias (online or otherwise), news sites, or articles from user-edited sources such as Wikipedia (however, this type of resource can be used for initial uncited research which will often lead you to acceptable sources). 
5. You must use resources with a specific technical focus on your topic.
Using the “Tell Them…” Method
One of the most tried and true standards for good quality papers is to use the “Tell Them” model for crafting information. The model is broken out like this:
1. Tell Them what you are going to tell them. (introduction)
2. Tell Them about it (body of the paper)
3. Tell Them what you told them. (conclusions)
To put this into perspective of a research paper, in the introduction you will “Tell Them What you are going to tell them”. This gives the reader an idea of what to expect and helps setup a good structure for your paper. Obviously, don’t use the words “I am going to tell you” but make it clear what the purpose of the paper is.
In the body of the Research Paper, you will “Tell them about it.” Okay, you have explained at the beginning the topics you want to use and a broad overview of the information. Now you need to answer each piece of what you need to tell them. If you made it clear that you are going to talk about 4 specific things in the “Tell Them what you are going to tell them” section, then you should make sure to address all 4 items in detal.
Finally, in the conclusion of the Research Paper, “Tell Them What You Told Them.” This means that you can re-iterate what you talked about (don’t repeat it word for word but summarize the ‘big ideas’). Use this section to tie in each things you said you would talk about into a unified ending to your paper. 
Why do this? It is scientifically proven that if information is repeated at least three times, the audience is most likely to remember it more quickly than if it was stated one time or less. If you give your readers a solid structure, follow it and drive it home, your audience will likely stay more engaged with your subject. 

 Topic Computer science  Here you will submit an outline of your final project

 Topic Computer science 
Here you will submit an outline of your final project paper. Before you begin your outline, go to the Assignments area of the classroom. Read what is required for your final paper and build your outline accordingly. The template and sample attached there will help you.
Your outline should include your thesis statement (a single complete sentence), a description of the problem, and a thorough analysis of the problem. It is not necessary to include a solution to the problem.
You will most likely have between 4 and 7 sections in your outline, with the introduction and conclusion being at either end. The middle sections will likely be body paragraphs and should provide evidence to support the assertion that is your thesis statement. 
Be sure that the elements of the outline are complete sentences. Please note that, if you have one subheading in a category, you should have a second subheading.
Sample sentence outline
Responding to Others
Ask these questions about each draft you look at:
Is there a thesis statement that is a single, complete sentence (not a question)?
Does the outline present a description of the problem being explored?
Is movement from one section of the outline to the next smooth?
Does the outline include details as evidence for each assertion?
Are all elements of the outline complete sentences, with subject, predicate, and appropriate use of capitalization and terminal punctuation (period, question mark, or exclamation mark)?
Is the outline free of distracting mechanical, grammatical, and formatting issues?

  Once I’ve learned about my field’s discourse community, what do I do with that

 
Once I’ve learned about my field’s discourse community, what do I do with that information?
After you have looked at your program in the library’s page, do the following steps.
Go to a generative Artificial Intelligence (AI) site, such as ChatGPT or Google Bard, and type a question like this into the site’s chat box:
What style of writing do professionals in the field of ___(type in your program)___ use?
Example questions to ask AI:
What style of writing do professionals in the field of nursing use? 
What style of writing do professionals in the field of sports fitness use?
Copy and paste the answer from AI into a Word document. Be sure to write in the name of the AI tool you used to get these results. You will be pasting this information in the template to be turned in.
(NOTE: This site is a comprehensive catalog of AI tools: Futurepedia, The Largest AI Tools Directory. It is updated daily. Do a search for General Writing to get started.)
Open the template for the assignment and save it as a Word file with the title “(Your last name) Report on Communication.”
Answer the questions on the template with the information you have gathered and the analysis you have done.
 
Item 1 of the Portfolio:  Report on the Communication in My Field of Study (due in week 2)
For this assignment you will complete a form, providing information about 4 things:
The program (discipline) you are studying (examples: Intelligence Studies or Criminal Justice).
Some ways you learned about folks in your discipline (looking at journals, websites, organizations, books, blogs, podcasts, etc.).
Tips for communicating with folks in your discipline gathered from Artificial Intelligence (AI).
YOUR tips for communicating with folks in your discipline (merging AI observations with your own).
Read the information below for a broad understanding of the purpose of this assignment. Refer to the attached template for more specific details on what to do.

 50 words Older Adults and Advanced Care Planning For this week’s discussion, sh

 50 words
Older Adults and Advanced Care Planning
For this week’s discussion, share your thoughts about advanced care planning or communicating with older adults.
Please refer to concepts covered in this week’s resources or activities.
Attaching an article, video, podcast, meme, et cetera, as part of your post is always a good idea, but remember that you will need to write sufficient text in the post to meet the required point total for the post. Points will not be earned for merely attaching the resource and submitting a post without any descriptive text.
Note: Do not create your post as a reply to the pinned post. Instead, use Yellowdig’s Create option to create a new post.
Select one of the following prompts to begin your discussion post this week:
Advanced care planning is not just about old age. After reading the material for this week, what are your thoughts about developing your own advanced care plan?
Share a link or an attachment to an advanced directive template. Discuss at least one strength and one limitation of the advance directive you shared.
It may take more time to build a rapport with an older client as compared to a younger client. Discuss three steps you would take to build a rapport with an older adult. Discuss one thing you shouldn’t do when building a rapport with an older adult and why.
Delivering bad news is never easy. What are three things you learned about delivering bad news?

Brandon  Security design principles are fundamental concepts that provide a basi

Brandon 
Security design principles are fundamental concepts that provide a basis for understanding, developing, and evaluating security mechanisms. These principles include least privilege, fail-safe defaults, economy of mechanism, complete mediation, open design, separation of privilege, least common mechanism, and psychological acceptability (Gollmann, 2011). Authentication methods are used to verify the identity of users, systems, and applications. The most common method is password-based authentication, where users are required to enter a unique password. However, this method has its weaknesses such as the possibility of password cracking or guessing. To mitigate these risks, organizations implement password policies that dictate the complexity, length, and expiration of passwords (Jermyn, et al., 1999). In terms of other authentication methods, two-factor authentication (2FA) or multi-factor authentication (MFA) have been adopted widely. 2FA requires the user to provide two different types of information, typically something they know like a password, and something they have, such as a security token or a smartphone app. MFA extends this by requiring additional verification methods like biometrics (Furnell, 2007).
The principle of least privilege suggests that a user should be given the minimum levels of access necessary to complete their tasks. This can be achieved through the use of role-based access control (RBAC), where access rights are based on the role of the user within the organization (Sandhu et al., 1996). Similarly, the principle of fail-safe defaults means that access decisions should deny by default, and the access should be granted only when permitted. This principle can be implemented through the use of access control lists (ACLs), where each resource has an associated list of users that are permitted access (Gollmann, 2011). Ultimately, organizations should consider these security design principles when implementing authentication methods and password policies to ensure the security of their systems and data.
 Ezikiel
The principle of “Least Privilege” shows the importance of restricting user access to only the resources essential for their role within the organization. By implementing strong authentication methods, like biometrics or multi-factor authentication (MFA), and strong password policies, organizations can ensure that only authorized individuals have access to sensitive data or critical systems. This principle not only reduces the potential impact of insider threats but also mitigates the consequences of external attacks seeking to exploit weak authentication mechanisms. These measures not only enhance the overall security of a business but also create a culture of accountability among it’s users. Regularly updating password policies to show evolving security threats and educating people about the importance of secure authentication practices further solidifies the organization’s dedication to protecting against potential breaches. Additionally, implementing automated access controls that adjust user permissions based on changing roles or responsibilities aligns with the principle of least privilege, ensuring that users only have access to the resources necessary for their current tasks. Through these multifaceted approaches, organizations can effectively mitigate the risk of unauthorized access and protect sensitive assets from potential compromise. 
 

Concerning online applications, discuss the principles of CIA Triad (Confidentia

Concerning online applications, discuss the principles of CIA Triad (Confidentiality, Integrity, Availability) and propose an implementation process with the CIA’s adherence. (Hint: with online applications, detecting inadequate procedures, and careless employees).
Need 2-3 pages with peer-reviewed citations. No introduction or conclusion needed.
Please ensure NO AI and plagiarism free.

After reviewing chapter 2 and the “Identify Threats and Vulnerabilities,” compos

After reviewing chapter 2 and the “Identify Threats and Vulnerabilities,” compose a 5-7 page APA-formatted report, providing in-depth risk analysis and the result of an “undetected online security breach”.
Must include an introduction and a conclusion. Please, include recent peer-review references not older than five years. Must include minimum of 9 peer-reviewed citations.
Please ensure NO AI and plagiarism free.

You have been promoted as the manager of the e-commerce site for the company you

You have been promoted as the manager of the e-commerce site for the company you working for. You are concerned about a recent SQL attack that happened. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the website and database to be compromised by an SQL injection attack.
Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.
Follow the instructions below
Provide at least three reasons why it is less expensive to build secure software than to correct security issues after a breach.
Outline the objectives and purpose of your company’s “best secure coding practices” and explain how it will influence your division.
Evaluate which method of the secure software development lifecycle will best serve your team, and explain how you plan on implementing your thoughts into your existing processes.
Identify three resources that can be used as “reference material” and act as a beginner’s guide for new employees. Outline the importance of each resource and how each resource can assist new coders. 
Outline all the major aspects of the best practice coding guideline, including objectives, purpose, resources, and methodology

Question #1: Research two software firewalls and explain the advantages and disa

Question #1: Research two software firewalls and explain the advantages and disadvantages of each one of them. Which one would you recommend and why?
Question #2: What are the challenges in securing networks (internet, LANs, wireless)? Which network is most difficult to secure and why?