Cybersecurity Threats and the Future of Cybersecurity

This Competency Assessment assesses the following outcomes: IT104M5: Explain current cybersecurity threats and the future of cybersecurity. GEL-6.06: Apply research to create original insights and/or solve real-world problems. PC-2.2: Formulate innovative solutions for identified initiatives. Purpose To remain current in your discipline, you will have to continually review and learn about what might be taking place in the future that will impact the cybersecurity arena. This Assessment will allow you to research possible future cybersecurity considerations in several areas and to come up with solutions to challenges in the cybersecurity area. Assessment Instructions Part 1 Using the Reading, the library, and Internet research, answer or explain the following in a minimum 500-word paper that covers the following and includes three or more APA style references: Discuss security issues with ubiquitous data, mobile devices, and cybersecurity considerations. Explain the cybersecurity implications of cloud computing. What would be the cybersecurity implications of quantum computing? Note: Papers not meeting the minimum 500-word length requirement will not be accepted.   Part 2 In a minimum 500-word paper, explain the steps you would take if one of your organization’s main servers was infected by malware. Use outside research to support your solution to this real-world problem. Your paper must demonstrate an assessment of the problem, your decision-making process, and a justification for your conclusion in relation to your research. You must provide at least three appropriate resources for your paper. Be sure to cite the resources you use in proper APA style formatting.  Note: Papers not meeting the minimum 500-word length requirement will not be accepted.   Part 3 (refer to Attacking a Virtual Private Network (Part 3 Lab)) Access the link entitled “Attacking a Virtual Private Network” in this Assessment section. There are also links for a Common Lab Tasks Manual and for J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference. Complete the assigned parts of the Lab. Provide the screenshots as specified below. Open the lab entitled “Attacking a Virtual Private Network” using the link in this Lab section. On the Intro tab read “Introduction” to the “Deliverable” section. Select Section 1: Hands-On Demonstration, select Part 1: “Follow a Social Engineering/Reverse Social Engineering Attack.” Complete Steps 1–-17, in Part 1: “Follow a Social Engineering/Reverse Social Engineering Attack.” Take a screenshot of Step 14. Complete Steps 1–19 in Part 2: “Spear Phishing Email attack.” Take screenshots of Steps 4 and 16. Once you have completed the Lab and have your screenshots, write an introductory paragraph that introduces the Lab to the reader. The introduction will be a minimum of 250 words and summarize what you did in the Lab and its importance to cybersecurity or the module materials. Along with your introduction and screenshots, include two additional sections, answering the following in a minimum of 250 words for each response: 1.  Explain how to steal a laptop or tablet at an airport. 2.  Explain an effective phishing email.   Note: Papers not meeting the minimum word requirements, providing all screenshots, and all questions answered will not be accepted. Minimum Submission Requirements This Assessment should be a Microsoft® Word® document of at least 1750 words plus screenshots, in addition to the title and reference pages. Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your paper should be highly organized, logical, and focused. Your paper must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics. Your paper should provide a clearly established and sustained viewpoint and purpose. Your writing should be well ordered, logical and unified, as well as original and insightful. A separate page at the end of your research paper should contain a list of references, in APA format. Use your textbook, the Library, and the internet for research. Be sure to cite both in-text and reference list citations were appropriate and reference all sources. Your sources and content should follow proper APA citation style. For assistance with APA requirements, please go to APA Style Central. You will find the link in the Academic Tools section of the course. (It should include a cover sheet, paper is double spaced, in Times New Roman 12-point font, correct citations, Standard English with no spelling or punctuation errors, and correct references at the bottom of the last page.) If work submitted for this competency assessment does not meet the minimum submission requirements, it will be returned without being scored.   Plagiarism Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism. Review the rubric before beginning this activity.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more