Evaluating the effectiveness of cybersecurity measures in protecting sensitive data.

Write a research paper using evidence to support a thesis that addresses your research question, examining a current issue or event in the news from the perspective of your field of study. The audience is people who are generally educated but do not have extensive knowledge of your field or topic. 


Use and cite at least eight sources to earn the maximum possible points on this assignment.

At least three of these must be from scholarly journals, and all sources should be selected based on reliability, currency, and level of information/analysis. The UMGC library will be instrumental in helping you find appropriate sources. You can, but do not have to, include all sources from your annotated bibliography.

It is possible to earn a B on this assignment using only six sources, including three scholarly journal articles. Gaining an A will require two additional sources.

Consider the following in incorporating your sources:

  • Sources are meant to help you build your argument, not to define the paper’s organization. Therefore, it is usually not helpful to have an entire paragraph focused on a single source or to concentrate on a source in a paragraph’s topic sentence.
  • To weave sources into your writing, avoid dropping quotes into your paper without an introduction or transition in your own words. An example of a transition into a quote is underlined in the following: This idea is corroborated by Snyder (2019), who explains that “community-based interventions have to be adequately funded” (p. 10).
  • It may also be helpful to follow a quote with a comment on its significance to the paper’s ideas.

Topic:

         
Evaluating the effectiveness of cybersecurity
measures in protecting sensitive data.

Questions:

1.      
What measures can be taken to avoid occurrences
of hacking?

2.      
To what extent can employee negligence
contribute to cybersecurity breaches?

3.      
What are the essential components of
comprehensive security protocols?

4.      
How does the vulnerability of interconnected
systems affect cybersecurity?

Thesis Statement:

         
While the progress of cybersecurity measures may
face obstacles due to changing cyber threats, the carelessness of employees,
and the susceptibility of interconnected systems, adopting thorough security
protocols and promoting awareness among people are effective measures to
improve cybersecurity.

Topic 1:

         
Cybersecurity measures face numerous challenges
due to the constantly changing nature of cyber threats.

Topic 2:

         
Employee carelessness can also jeopardize
cybersecurity efforts.

Topic 3:

         
Interconnected systems, while inherently
beneficial, also create vulnerabilities in cybersecurity.

References:

         
News Articles:

Our Foreign
Staff. (2023, January 6). Russian hackers targeted three nuclear labs in US.
The Telegraph. https://www.telegraph.co.uk/world-news/2023/01/06/russian-hackers-targeted-three-nuclear-labs-us/


Corfield, G.
(2023, August 12). Russian spy agencies targeting Starlink with custom malware,
Ukraine warns. The Telegraph. https://www.telegraph.co.uk/business/2023/08/12/russian-spy-agencies-targeting-elon-musk-starlink-malware/


Keeper Security.
(2023, January 24). Keeper security shares password best practices ahead of
Data Privacy Day. PR Newswire: press release distribution, targeting,
monitoring and marketing. https://www.prnewswire.com/news-releases/keeper-security-shares-password-best-practices-ahead-of-data-privacy-day-301728913.html.

Komando, K.
(2023, March 19). Being harassed on the web? Prevent online stalking with these
tips. USA Today. https://www.usatoday.com/story/tech/columnist/komando/2023/03/19/tips-to-prevent-stop-online-stalking/11478910002/


         
Scholarly Journals

Molitor, D.,
Raghupathi, W., Saharia, A., & Raghupathi, V. (2023). Exploring Key Issues
in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based
Text Analytics. Information (2078-2489), 14(11), 600. https://doi-org.ezproxy.umgc.edu/10.3390/info14110600


Serac, C. A.
(2023). Digital Transformation Vulnerabilities: Assessing the Risks and
Strengthening Cyber Security. Annals of the University of Oradea, Economic
Science Series, 32(1), 771–781. https://search-ebscohost-com.ezproxy.umgc.edu/login.aspx?direct=true&db=bsu&AN=169989462&site=eds-live&scope=site.

Singh, Y.,
Adamya, H., Aryan, Sanidhya, & Sayyad. (2023). Research on Ethical Hacking.
Grenze International Journal of Engineering & Technology (GIJET), 9(1),
154–160. https://search-ebscohost-com.ezproxy.umgc.edu/login.aspx?direct=true&db=iih&AN=162319840&site=eds-live&scope=site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.