Cyber-Attack PLEASE FOLLOW THE RUBIC

Cyber-Attack PLEASE FOLLOW THE RUBIC

Assignment 1:

Go online and look for information about an attack on a government or military information system.

Assessment: Write a 5 paragraph essay in APA format with references and submit as required.

Grading Rubric for Assignment

Criteria

Developing

Competent

Exemplary

Weight

Topic

Vague, irrelevant information which was not connected to negligent liability or other liability associated with security work.

Captured the some aspects of negligent liability and other liability within security work.

Clearly and specifically addressed the most relevant aspects of negligent liability and other liability associated with security work.

Structure and Organization

Lacks clear organization; ideas do not follow a logical order and do not support the central focus.

Generally well organized, ideas usually follow logical order and support central focus, although greater attention to detail would improve the paper.

Well organized, ideas follow a logical order with appropriate transitions and always supporting central focus.

Development and Organization

Rarely or never uses reasons, examples or evidence to support ideas.

Generally uses appropriate reasons, examples or evidence to support ideas, although additional support would improve the paper.

Consistently and properly uses appropriate reasons, examples or evidence to support ideas.

Grammar/Mechanics

Inadequate sentence and paragraph structure with many grammar errors.

Adequate sentence and paragraph structure with few grammar errors.

Excellent sentence and paragraph structure with minor grammar errors.

APA

Serious and persistent errors in APA conventions for title page, font and spacing, page numbering, in text citation, and reference page

Generally follows APA conventions for title page, font and spacing, page numbering, in text citation and reference page but with a few minor errors

Follows APA conventions for title page, font and spacing, page numbering, in text citations and reference page

Attachments area

20170727212611sec_305_assignment

 

 

 

Solution Preview

In 2008, the US military’s networks were under cyber-attack and according to a top US military official, it came from a corrupted flash drive. This action forced the Pentagon to assess its digital security. The flash drive was placed in a military laptop in the Middle East and it contained harmful code that was not easily detected as it spread through both secret and non-secret systems.

(405 words)

Open chat
Hello
Contact us here via WhatsApp