IT537-2: Synthesize cyber security Essay
Order ID# 45178248544XXTG457 Plagiarism Level: 0-0.5% Writer Classification: PhD competent Style: APA/MLA/Harvard/Chicago Delivery: Minimum 3 Hours Revision: Permitted Sources: 4-6 Course Level: Masters/University College Guarantee Status: 96-99% Instructions
IT537-2: Synthesize cyber security Essay
IT537, Synthesize, cyber security Essay
IT537-2: Synthesize cyber security threats and their potential consequences to assess risk.
Scenario:
Immediately following the 9/11 attacks on the United States, Congress passed a series of legislative acts intended to expand various law enforcement capabilities and created the Department of Homeland Security to aid in enforcing those acts. Over the years following 9/11, the responsibilities assigned to the Department of Homeland Security have expanded to incorporate money laundering, human rights violations, and narcotics and weapons trafficking.
One of Homeland Security’s primary responsibilities is the prevention of terrorism. Research the main components of Homeland Security’s terrorism prevention program and discuss how these components do or do not work together to create a united anti-terrorism front for the United States. The components can be found on the Homeland Security website.
Instructions:
Following the process described in the “Writing a Critical Essay”, write a 5–6-page research paper that examines the nine main components of Homeland Security’s terrorism prevention program in depth. Be sure to expand on whether or not the components effectively work together and support your position. The minimum page count is 5–6 pages (excluding cover page, etc.). If you require more pages to thoroughly defend your position, feel free to include them.
Your paper should use Times New Roman 12-point font, be double spaced, and use correct APA formatting (cover page, table of contents, abstract, and reference page). Be sure to use proper APA in-text citations that match your reference list.
A minimum of three peer-reviewed articles should be used to support your arguments in the research paper. Use the Library to search for supporting articles and use the “peer reviewed” filter to find the appropriate material. You may also use additional material, such as trade magazine articles, but avoid Wikipedia.
In accordance with the Academic Integrity policy, your Assignment will be automatically submitted to TurnItIn (see http://turnitin.com/en_us/features/originalitycheck). The policy states that papers submitted for credit in any course should contain less than 25% non-original material, so avoid large sections of direct quotes and be sure that you use APA formatting to properly cite and reference all non-original material.
No more than one figure and/or one table should be included and any figures or tables used must clearly support a specific point of the critical analysis. Any figure or table must use an APA formatted figure or table caption.
Project Requirements:
The research paper follows the Writing Guide requirements and establishes a main point or position, uses a minimum of three peer-reviewed sources in support of that position, and provides a clearly worded conclusion.
The essay is 5–6 pages of content (excluding cover sheet, etc.) and uses Times New Roman 12-point font, is double spaced, and uses correct APA formatting (cover page, table of contents, abstract, and reference page).
No more than one figure and/or table in the content.
No spelling errors.
No grammar errors.
No APA errors.
For more information and example of APA formatting, see the resources in Doc sharing or visit the Writing Center from the campus Homepage.
Also review the Policy on Plagiarism. If you have any questions, please contact your professor.
.
RUBRIC
Excellent Quality 95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support 91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology 58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score 50-85%
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality 0-45%
37-1 points The background and/or significance are missing. No search history information is provided.
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.perfectacademic.com/orders/ordernow or www.crucialessay.com/orders/ordernow
IT537-2: Synthesize cyber security Essay