[Get Solution] Cybersecurity Threats and the Future of Cybersecurity

This Competency Assessment assesses the following outcomes: IT104M5: Explain current cybersecurity threats and the future of cybersecurity. GEL-6.06: Apply research to create original insights and/or solve real-world problems. PC-2.2: Formulate innovative solutions for identified initiatives. Purpose To remain current in your discipline, you will have to continually review and learn about what might be taking place in the future that will impact the cybersecurity arena. This Assessment will allow you to research possible future cybersecurity considerations in several areas and to come up with solutions to challenges in the cybersecurity area. Assessment Instructions Part 1 Using the Reading, the library, and Internet research, answer or explain the following in a minimum 500-word paper that covers the following and includes three or more APA style references: Discuss security issues with ubiquitous data, mobile devices, and cybersecurity considerations. Explain the cybersecurity implications of cloud computing. What would be the cybersecurity implications of quantum computing? Note: Papers not meeting the minimum 500-word length requirement will not be accepted.   Part 2 In a minimum 500-word paper, explain the steps you would take if one of your organization’s main servers was infected by malware. Use outside research to support your solution to this real-world problem. Your paper must demonstrate an assessment of the problem, your decision-making process, and a justification for your conclusion in relation to your research. You must provide at least three appropriate resources for your paper. Be sure to cite the resources you use in proper APA style formatting.  Note: Papers not meeting the minimum 500-word length requirement will not be accepted.   Part 3 (refer to Attacking a Virtual Private Network (Part 3 Lab)) Access the link entitled “Attacking a Virtual Private Network” in this Assessment section. There are also links for a Common Lab Tasks Manual and for J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference. Complete the assigned parts of the Lab. Provide the screenshots as specified below. Open the lab entitled “Attacking a Virtual Private Network” using the link in this Lab section. On the Intro tab read “Introduction” to the “Deliverable” section. Select Section 1: Hands-On Demonstration, select Part 1: “Follow a Social Engineering/Reverse Social Engineering Attack.” Complete Steps 1–-17, in Part 1: “Follow a Social Engineering/Reverse Social Engineering Attack.” Take a screenshot of Step 14. Complete Steps 1–19 in Part 2: “Spear Phishing Email attack.” Take screenshots of Steps 4 and 16. Once you have completed the Lab and have your screenshots, write an introductory paragraph that introduces the Lab to the reader. The introduction will be a minimum of 250 words and summarize what you did in the Lab and its importance to cybersecurity or the module materials. Along with your introduction and screenshots, include two additional sections, answering the following in a minimum of 250 words for each response: 1.  Explain how to steal a laptop or tablet at an airport. 2.  Explain an effective phishing email.   Note: Papers not meeting the minimum word requirements, providing all screenshots, and all questions answered will not be accepted. Minimum Submission Requirements This Assessment should be a Microsoft® Word® document of at least 1750 words plus screenshots, in addition to the title and reference pages. Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your paper should be highly organized, logical, and focused. Your paper must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics. Your paper should provide a clearly established and sustained viewpoint and purpose. Your writing should be well ordered, logical and unified, as well as original and insightful. A separate page at the end of your research paper should contain a list of references, in APA format. Use your textbook, the Library, and the internet for research. Be sure to cite both in-text and reference list citations were appropriate and reference all sources. Your sources and content should follow proper APA citation style. For assistance with APA requirements, please go to APA Style Central. You will find the link in the Academic Tools section of the course. (It should include a cover sheet, paper is double spaced, in Times New Roman 12-point font, correct citations, Standard English with no spelling or punctuation errors, and correct references at the bottom of the last page.) If work submitted for this competency assessment does not meet the minimum submission requirements, it will be returned without being scored.   Plagiarism Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism. Review the rubric before beginning this activity.

Struggling to find relevant content? Order a custom essay on
[Get Solution] Cybersecurity Threats and the Future of Cybersecurity
Let our experts save you the hassle
Order Now
Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Get personalized services with GPA Fix
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
IT, Web
Paper was great and accomplished everything I needed.
Customer 452885, October 27th, 2022
Everything was done thoroughly and with care. Awesome job!!!
Customer 452453, April 10th, 2021
Thank you so much for being the best website for assignment help.
Customer 452635, June 24th, 2022
Another great paper! Thank you!
Customer 452707, June 16th, 2022
Customer 452587, July 28th, 2021
Excellent job on the paper!
Customer 452885, December 28th, 2022
Good mastery of ABA concepts. Excellent!
Customer 452469, May 14th, 2022
Thank you great job
Customer 452813, July 10th, 2022
Customer 452813, June 25th, 2022
Professions and Applied Sciences
Thank you!
Customer 452707, March 4th, 2022
Customer 452813, July 5th, 2022
Thank you!
Customer 452707, October 16th, 2022
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
error: Content is protected !!

Save More. Score Better. Use coupon code SPECIAL for a 15%discount