• Home
  • Archive by category "Information Technology, IT"

security architecture and design

Zero: Describe the system (briefly!).  As in: I’m going to talk about the _____ system, which does this, that and the other thing.First: When we talk about confidentiality, we’re talking about unauthorized access to information.  That means there is (or at least probably is) authorized access to information.  For your system, what roles or people are there with authorized access – and what information can they see or use.  Is there anything special about their roles or their level of access?  Are there exceptions?Second: What (briefly) is the worst possible scenario you can think of for a confidentiality failure/breach?  What repercussions or impacts are there?Third: How – in technical or other terms – could (or can) you improve the security of the situation?  What measures or technologies would make sense?  Why?

370 (5)

Your paper will be an annotated bibliography, specifically focusing on the “Depth” topic (i.e. Defense in Depth) in the context of protecting National Infrastructure.

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers. 

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out. 

 

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography_apa.cfm

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf

http://libguides.enc.edu/writing_basics/annotatedbib/apa    <<<< Check out the "Rules! rules! rules!" section http://guides.library.cornell.edu/annotatedbibliography https://owl.english.purdue.edu/owl/resource/614/03/

Network Assignment need tonight by NLT 11:30pm

your paper will be an annotated bibliography, specifically focusing on the topic of using simulations for policy making. The papers you select must address how IT is used to model behavior for policy making.
You paper must be in correct APA format, use correct grammar, and will need to include at five (5) resources, ALL of which must:
1) Be current. Published within the last few years.
2) Be peer-reviewed.
3) Relate directly to using simulations for policy making. The papers you select must address how IT is used to model behavior for policy making.
USE YOUR OWN WORDS!!!! DO NOT PLAGIARIZE!!!! 
Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers. 
Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out.