{"id":11460,"date":"2024-02-13T15:57:39","date_gmt":"2024-02-13T15:57:39","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/individual-assignment-week-5-paper-or-video-option-on-cyberwar-insider-threats-web-2-0\/"},"modified":"2024-02-13T15:57:39","modified_gmt":"2024-02-13T15:57:39","slug":"individual-assignment-week-5-paper-or-video-option-on-cyberwar-insider-threats-web-2-0","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/individual-assignment-week-5-paper-or-video-option-on-cyberwar-insider-threats-web-2-0\/","title":{"rendered":"Individual Assignment Week 5 &#8211; paper or video option on cyberwar, insider threats, Web 2.0"},"content":{"rendered":"<p>please make its at least 900 words<\/p>\n<div>\n<p style=\"margin-right: 0px; margin-bottom: 1em; margin-left: 0px; font-size: 19px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\">Cyberwar, Insider Threats, Web 2.0<\/b><\/p>\n<p style=\"margin: 0.5em 0px 1em; font-size: 19px; cursor: auto; color: inherit;\">Using<span style=\"cursor: auto; color: inherit;\"><\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>this drop box you have the option to record a video<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">OR<\/span><\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>to write a research paper for the Weekly assignment.<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><b style=\"font-weight: bold; cursor: auto; color: inherit;\">AT LEAST ONE of your weekly assignment options must be a video and AT LEAST ONE must be a written essay.<\/b><\/span><\/p>\n<p style=\"margin: 0.5em 0px 1em; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">If you choose the video option, please watch the YouTube video at:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\">https:\/\/www.youtube.com\/watch?v=ZmyIejJVyn4&amp;feature=youtu.be<\/a><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>for instructions. Please note that the video option also requires an accompanying Power Point presentation that you upload with your video. The video itself should be between 4 and 5 minutes. If you require more time, you will need to create a YouTube video and provide the link to your instructor.<\/span><\/span><\/p>\n<p style=\"margin: 0.5em 0px 1em; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The essay option requires a minimum of 800 words and no more than 1000 words of content. Include APA standards for style, citations, references, and format. Be sure to include a title page with your name and the name of the essay. Please refer to our APA Manual or visit the Purdue Owl website at:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\">https:\/\/owl.english.purdue.edu\/owl\/resource\/560\/01\/<\/a><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>for assistance with APA formatting and style guidelines.<\/span><\/span><\/p>\n<p style=\"margin: 0.5em 0px 1em; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Whether you choose the video option or the essay option, you must use at least four (4) sources from professional websites or scholarly journals. Some examples include the SPC Library,<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\">www.sans.org<\/a>,<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\">www.wired.com<\/a>,<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\">www.cert.org<\/a>, and<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\">www.nsa.gov<\/a>. You may not use Wikipedia, ask.com, or other related dictionary sites. All sources must be cited within the text or mentioned within the video presentation according to APA guidelines and must appear at the end of your essay on a separate Reference List page or on the last page of your Power Point presentation.<\/span><\/span><\/p>\n<p style=\"margin: 3pt 0in; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Answer<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><b style=\"font-weight: bold; cursor: auto; color: inherit;\">ONE<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/b>of the analysis options below.<\/span><\/span><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Remember to support your opinions with research.<\/p>\n<p style=\"margin: 0.5em 0px 3pt; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Option 1<\/span><\/b><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">: Cyberwar<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin: 0.5em 0px 3pt; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Review the Video on Cyberwar Threats at<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"margin: 0.5em 0px 3pt; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\">https:\/\/www.youtube.com\/watch?v=UaZw9mQu7xg&amp;list=PLOzW4_3NDm3LWs17JAZ-p0u39FL9VlZV4&amp;index=3<\/a><\/p>\n<ol style=\"margin-top: 1em; margin-right: 0px; margin-left: 0px; font-size: 19px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Summarize the main points from the video.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Do you think the government should take a more proactive role in fighting potential cyberwars. Or, should private industry be more responsible?<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Review a recent article on cyberwar or cyberterrorism and summarize its main points.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">If you were in charge of Homeland Security, what are some of the actions you would suggest this country take?<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<\/ol>\n<p style=\"margin: 0.5em 0px 3pt; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Option 2<\/span><\/b><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">: Insider Threats<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<ol style=\"margin-top: 1em; margin-right: 0px; margin-left: 0px; font-size: 19px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Analyze the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">What are the various profiles of insiders who may compromise your systems?<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">What methods can companies take to thwart insider threats? (Think of methods such as personnel checks, monitoring access, risk management services, suspicious activity, etc).<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<\/ol>\n<p style=\"margin: 0.5em 0px 3pt; font-size: 19px; line-height: normal; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Option 3<\/span><\/b><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">: Web 2.0 Security<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/p>\n<ol style=\"margin: 1em 0px 0px; font-size: 19px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Analyze the security risks and features of Web 2.0 or a selection of solutions such as Facebook, Twitter, MySpace, and LinkedIn.<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Is it more or less secure that the traditional Web, are some type of services more risky? Why? How should one protect yourself and your organization?<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">What issues does this raise for ecommerce sites and merchants?<\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">You might start with a general article such as<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><a style=\"cursor: auto;\">www.informationweek.com\/software\/information-management\/web-20-triggers-government-security-challenges\/d\/d-id\/1091042<\/a><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>and then add current source (less than 18 months old) OR focus on recent articles only.<\/span><\/li>\n<\/ol>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>please make its at least 900 words Cyberwar, Insider Threats, Web 2.0 Using&nbsp;this drop box you have the option to record a video&nbsp;OR&nbsp;to write a research paper for the Weekly assignment.&nbsp;AT LEAST ONE of your weekly assignment options must be a video and AT LEAST ONE must be a written essay. If you choose the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[23],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/11460"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=11460"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/11460\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=11460"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=11460"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=11460"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=11460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}