Categories: Uncategorized

Computer Security

Assignment Purpose:

The purpose of this assignment is to provide students with an opportunity to enhance their critical and creative thinking skills by conducting research to further learn about current issues in information system and their impact on the society at large.

 

Assignment Directions:

Complete tasks 1-5 as stated below. For this assignment, you will be required to conduct research and report your findings in a written paper (see below for Report Specifications). You will be graded on the depth and breadth of the research, contents of the paper, how well the paper meets the listed requirements for the assignment, spelling, and grammar.  By completing this assignment, you should become more familiar with the current issues of IT and relate them to a real-world situation.  See attached files for additional information.

 

Task 1 – Research:

First, visit https://www.computerweekly.com/opinion/The-greatest-contest-ever-privacy versus-security  site and read “The greatest contest ever – privacy versus security” article on computer security versus privacy to gain an understanding of the topic.  

 

Next, conduct brief research on the “Computer Security Versus Privacy” topic referencing current events as they relate to the topic.  

 

Then, analyze the information with respect to different perspectives, theories, or solutions.

 

Finally, present and describe your opinion on the topic and reflect on what you learned from completing this assignment.

 

Below is a list of topics you need to address in your paper:

1.    Define computer security and discuss a specific aspect of computer security that you found to be most intriguing.

2.    How is computer security understood? How is data collected? Who collects the data? What limitations exist with computer security and what are the implications?

3.    Define computer privacy and discuss a specific aspect of computer privacy that you found to be most intriguing.

4.    How is privacy understood? How is data secured? Who uses the data and for what purpose?

5.    Present in-depth information regarding existing knowledge on the topic and include the various viewpoints and ideas regarding computer security and privacy?

6.    Based on the existing literature and data, what insightful trends can you identify that relate to your thesis?

7.    Based on your research, what conclusions can you draw from your findings?

 

 

Task 2 – Report Specifications:

Write a report to document your research findings with the following report specifications.  Save your work in a Word file with your lastname-firstname as the file name (e.g., smith-jane).  See attached for a sample report and the rubric that will be used to grade this assignment.

Use Word to generate a report with the following specifications:

·       The report body should be a maximum of 1000 words (not including the cover page, table of contents, bibliography page, and appendices).

·       Use Arial font size 12 with 1” for all margins.

·       Not including your textbook, use at least three different and recent references (less than 3 years old), and use citation to credit sources of information (see below).

·       Cover page: The report should have a cover page that includes your full name, course name and CRN, and your topic.

·       Table of Contents (TOC): The report should have a table of contents showing page numbers for the rest of the report.

·       The report should start with an introduction section that introduces the research topic and why you chose the topic.

·       Report Body: The body of report should contain explanation of task 1 items 1-5, analysis of the information, and your research findings.

·       Conclusion: The report should end with a conclusion section that summarizes the research and discusses task 1  items 6-7.

·       Bibliography References: The report should have a reference page that lists all citations and sources (see below).

·       Appendices: Although appendices are not required, you may include figures including diagrams and charts in appendices.  Be sure to use citation to credit sources.

Notes:

·       Do not use or include Wikipedia as a resource.

·       Except for the course textbook, do not use books as a resource.

·       When using websites, each web page on a single website is a part of the same website.

·       Make sure you have at least 3 references with publication dates within the last 3 years.

 

Citations:

·       Utilize APA formatting for all citations.

·       Note source for each citation, copy it, and then paste each of the sources into the Bibliography reference section in alphabetical order and after the conclusion section on a separate page.

·       For more information on formatting for APA style, access information at the following site: http://library.uhd.edu/apa

 

Task 3: Proofread your work:

·      First, utilize the below noted Fundamental Writing Errors to correct your writing.

·      Next, create a Grammarly account (www.grammarly.com) and check your report to make sure it is grammatically correct.

·      Finally, contact the staff in the UHD Writing & Reading Center (WRC) – Writing Lab  and asked them to review your paper and email you their comments so that you can make corrections accordingly.  Keep in mind that 10% of this assignment’s grade (10 Points) is reserved for the Writing Center’s email receipt confirming that they have reviewed your paper. For additional information about WRC services and hours, see (https://www.uhd.edu/academics/writing-center/Pages/writing-center-  index.aspx)

 

Task 4: Check your paper for originality:

Turnitin has a tool to check for plagiarism:  Originality/Similarity Reports.  Submit your paper to the BB/Assignments/General Turnitin Revision (0 Points) to check for originality/similarities and plagiarism problems and refine your work accordingly and until similarity score is less than 5% and use of AI tools is less than 5%. Keep in mind that you may submit your paper to the General Turnitin Revision link as many times as you wish, and that papers submitted to the General Turnitin Revision link will NOT be graded.

 

Essay Mill

Share
Published by
Essay Mill

Recent Posts

Childbirth

For this short paper activity, you will learn about the three delays model, which explains…

8 months ago

Literature

 This is a short essay that compares a common theme or motif in two works…

8 months ago

Hospital Adult Medical Surgical Collaboration Area

Topic : Hospital adult medical surgical collaboration area a. Current Menu Analysis (5 points/5%) Analyze…

8 months ago

Predictive and Qualitative Analysis Report

As a sales manager, you will use statistical methods to support actionable business decisions for Pastas R Us,…

8 months ago

Business Intelligence

Read the business intelligence articles: Getting to Know the World of Business Intelligence Business intelligence…

8 months ago

Alcohol Abuse

The behaviors of a population can put it at risk for specific health conditions. Studies…

8 months ago