Sophisticated Nature of Today’s Cyber-Attack
Order ID# 45178248544XXTG457 Plagiarism Level: 0-0.5% Writer Classification: PhD competent Style: APA/MLA/Harvard/Chicago Delivery: Minimum 3 Hours Revision: Permitted Sources: 4-6 Course Level: Masters/University College Guarantee Status: 96-99% Instructions
Sophisticated Nature of Today’s Cyber-Attack
- Response needed for the below post
Based on the sophisticated nature of today’s cyber-attack, it is prudent to diversify the security approach. Diversity should focus on all components of the IT system bearing the wider scope of the modern cyber technology. Since organizations are using the connected devices, the internet of things and the cloud system, the security diversity should broaden its
scope to cover all these components (Sandhya & Sushila, 2017). On the other hand, the security strategy should be proactive in the sense that it should strive to prevent the insecurity event than rather focusing on the real even.
Sophisticated Nature
The basic security guidelines bulleted at the conclusion section, are sound and any organizations implement all of them if possible. Even more significantly, the security policy should focus on machine learning ability, storage power, and data mining techniques since it is from these concepts the current security pitfalls lie (Sandhya & Sushila, 2017). An
organization should analyze the security risks associated with cloud computing, virtualizations, and big data to build an effective security strategy. Finally, the reason why I think the author highlighted the most important security approaches is the fact that the best security strategy should focus on the direction the future cyberattacks are likely to take. It means
that an organization should build its security strategy based on the future scope of security implications.
- Response needed for the below post
Given paper deals with the change in cyber security and the reasons for the requirement of such change. Cyber security is increasingly becoming as necessity in today’s data dominated world. With the increasing data, the need to protect data is also increasing. Cyber security is crucial since the data created by various fields like bio informatics, Government researches, classified projects, banking etc. is sensitive. Paper also briefs about the High Performance computing, and how it is important to have more robust cyber security system for the better function of the HPCs and protection of the enormous data created by it.
Sophisticated Nature
Conclusions drawn in this paper are partially aligned with the requirement of cyber security in nonspecific way. That is each conclusion is general and superficial without any specificity. Requirement of better cyber security in different fields should be addressed in depth. Merely concluding “cyber security should be more pro active and dynamic”, not necessarily concludes anything. It is a go to conclusion for any cyber security paper. However, the other conclusions like building intelligent cyber security by exploiting the predictive powers of machine learning and data mining is predictive in nature and is highly researched upon.
Virtual dispersive technology, use of data mining and machine learning for the building of early warning systems are innovative techniques and ideas. But the actual know-how of the mentioned advancements is not touched in the paper. What paper actually doing here is to run through the various bottlenecks/pitfalls in cyber security and explains how cyber security goes out of date with many technological advancements and restless new attack methods by the hackers to get hold of data. But the Intelligent cyber security solutions are mere mentions o vaguely explained.
RUBRIC
Excellent Quality 95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support 91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology 58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score 50-85%
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality 0-45%
37-1 points The background and/or significance are missing. No search history information is provided.
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.perfectacademic.com/orders/ordernow or www.crucialessay.com/orders/ordernow Sophisticated Nature
Sophisticated Nature