Write a research paper using evidence to support a thesis that addresses your research question, examining a current issue or event in the news from the perspective of your field of study. The audience is people who are generally educated but do not have extensive knowledge of your field or topic.
Use and cite at least eight sources to earn the maximum possible points on this assignment.
At least three of these must be from scholarly journals, and all sources should be selected based on reliability, currency, and level of information/analysis. The UMGC library will be instrumental in helping you find appropriate sources. You can, but do not have to, include all sources from your annotated bibliography.
It is possible to earn a B on this assignment using only six sources, including three scholarly journal articles. Gaining an A will require two additional sources.
Consider the following in incorporating your sources:
- Sources are meant to help you build your argument, not to define the paper’s organization. Therefore, it is usually not helpful to have an entire paragraph focused on a single source or to concentrate on a source in a paragraph’s topic sentence.
- To weave sources into your writing, avoid dropping quotes into your paper without an introduction or transition in your own words. An example of a transition into a quote is underlined in the following: This idea is corroborated by Snyder (2019), who explains that “community-based interventions have to be adequately funded” (p. 10).
- It may also be helpful to follow a quote with a comment on its significance to the paper’s ideas.
Topic:
–
Evaluating the effectiveness of cybersecurity
measures in protecting sensitive data.
Questions:
1.
What measures can be taken to avoid occurrences
of hacking?
2.
To what extent can employee negligence
contribute to cybersecurity breaches?
3.
What are the essential components of
comprehensive security protocols?
4.
How does the vulnerability of interconnected
systems affect cybersecurity?
Thesis Statement:
–
While the progress of cybersecurity measures may
face obstacles due to changing cyber threats, the carelessness of employees,
and the susceptibility of interconnected systems, adopting thorough security
protocols and promoting awareness among people are effective measures to
improve cybersecurity.
Topic 1:
–
Cybersecurity measures face numerous challenges
due to the constantly changing nature of cyber threats.
Topic 2:
–
Employee carelessness can also jeopardize
cybersecurity efforts.
Topic 3:
–
Interconnected systems, while inherently
beneficial, also create vulnerabilities in cybersecurity.
References:
–
News Articles:
Our Foreign
Staff. (2023, January 6). Russian hackers targeted three nuclear labs in US.
The Telegraph. https://www.telegraph.co.uk/world-news/2023/01/06/russian-hackers-targeted-three-nuclear-labs-us/
Corfield, G.
(2023, August 12). Russian spy agencies targeting Starlink with custom malware,
Ukraine warns. The Telegraph. https://www.telegraph.co.uk/business/2023/08/12/russian-spy-agencies-targeting-elon-musk-starlink-malware/
Keeper Security.
(2023, January 24). Keeper security shares password best practices ahead of
Data Privacy Day. PR Newswire: press release distribution, targeting,
monitoring and marketing. https://www.prnewswire.com/news-releases/keeper-security-shares-password-best-practices-ahead-of-data-privacy-day-301728913.html.
Komando, K.
(2023, March 19). Being harassed on the web? Prevent online stalking with these
tips. USA Today. https://www.usatoday.com/story/tech/columnist/komando/2023/03/19/tips-to-prevent-stop-online-stalking/11478910002/
–
Scholarly Journals
Molitor, D.,
Raghupathi, W., Saharia, A., & Raghupathi, V. (2023). Exploring Key Issues
in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based
Text Analytics. Information (2078-2489), 14(11), 600. https://doi-org.ezproxy.umgc.edu/10.3390/info14110600
Serac, C. A.
(2023). Digital Transformation Vulnerabilities: Assessing the Risks and
Strengthening Cyber Security. Annals of the University of Oradea, Economic
Science Series, 32(1), 771–781. https://search-ebscohost-com.ezproxy.umgc.edu/login.aspx?direct=true&db=bsu&AN=169989462&site=eds-live&scope=site.
Singh, Y.,
Adamya, H., Aryan, Sanidhya, & Sayyad. (2023). Research on Ethical Hacking.
Grenze International Journal of Engineering & Technology (GIJET), 9(1),
154–160. https://search-ebscohost-com.ezproxy.umgc.edu/login.aspx?direct=true&db=iih&AN=162319840&site=eds-live&scope=site