SlideShare a Scribd company logo
1 of 12
Running head: GIVE ME A SHORT TITLE IN CAPS
1
GIVE ME A SHORT TITLE IN CAPS
3
Give me a title with Upper and Lower case letters Comment by
Diana Lucas: Be sure to change this to your actual title – don’t
forget to change the title in the both HEADERS as well.
Justin Basagic
University of Maryland University College
Abstract
In this paper, I will write a short essay that reflects my belief or
passion about a particular part of my professional experience.
The essay reflects what I value and what is important to me
about my profession.
Keywords: decision, military
Give me a title with Upper and Lower case letters Comment by
Diana Lucas: Be sure to change this to your actual title – don’t
forget to change the title in the both HEADERS as well. Do
NOT bold this title.
Cats are, without a doubt, awesome. While some would
challenge their awesomeness, those challengers are sadly
mistaken (or possibly allergy-ridden, in which case their
feelings are understandable but still mistaken). Not only are
cats awesome, however, but they are also the best, a fact that is
undeniable due to their totally sweet ninja moves and their
stellar senses. Comment by Diana Lucas: Suggest you copy &
paste your text into this area. Ensure your text is Times New
Roman, 12-pitch, and that your paragraphs are double-spaced.
Felines epitomize graceful movement, but they are primarily
known for their totally sweet ninja moves. One such movement
is the cat’s ability to right itself after falling off the upstairs
railing from a dead sleep (and look as it totally meant to do
that). Cats are also masters of surprise and have the ability to
stuff themselves into obscenely small spaces, only to pop out—
ninja-style—and snag their unwitting victims’ feet as they walk
by.
Cats’ totally sweet ninja moves are possible in large part due to
their outstanding and well-honed abilities to smell, hear, and
taste, as well as their stellar intuition regarding that which is
“good” and “bad.”
Annotated Bibliography: Trends in Cyber Security
By
Justin Basagic
17 October 2016
For my project I am going to discuss cyber security trends.
It always has intrigued me about how network managers adapt
to changes in technology. The cyber security field constantly
challenges the workers to grow and learn new things. I am
excited to research network penetration, cyber investigations,
and assessing overall network security for different
organizations.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the
global penetration of Sony Corp.'s rootkit installations on
computers. By using the Domain Name System (DNS), he was
able to trace connections to a Sony Web site and estimate the
extent to which personal computers had been infected by the
Sony rootkit installation, which sent information to Sony about
computer users' music copying and also made it difficult for
purchasers of Sony Music to copy their music to iTunes or other
music players.
Metasploit Penetration Testing Cookbook. (2013). Network
Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9
Metasploit is a favorite tool of people wearing white hats, black
hats and every shade in between. As a penetration testing tool,
it is immensely powerful (sometimes dangerously so). And the
same goes for its use as aa hacking tool. This is a very
interesting article showing how powerful tools can be used for
both good and bad.
Sández, M. R. (2015). A Review of Technical Problems when
Conducting an Investigation in Cloud Based Environments.
This article shines the light on how difficult it is to maintain
security and adopt new technologies. It explains how cloud base
computing has done wonders for businesses by making
resources easier to access and cheaper. It also divulges how
criminals can steal data from clouds and also hide nefarious
data in other peoples’ cloud storage.
Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015).
Towards the Forensic Identification and Investigation of
Cloud Hosted Servers through Noninvasive Wiretaps.
doi:10.1109/ARES.2015.77
This article actually gets into the nuts in bolts of conducting a
cyber investigation in a cloud environment. It discusses one of
the big challenges as conducting an investigation when you
might not have the cooperation of the people who own the
server.
Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R.
(2015). Network security and performance testing for health
information system management.
This article discusses the unique challenges that a hospital
presents fornetwork security. One of the main focuses is on
encryption (hospital traffic needs to be secure as it as patient
data in it).
Dixit, S. (2016). Holding the fort: a business case for testing
security. Network Security, 2016(6), 16-18.
doi:10.1016/S1353-4858(16)30059-9
This article talks about what to do when the costs of data
breaches keep skyrocketing year after year. An interesting note
is what can you do when the companies you hire keep being
breached.
Annotated Bibliography: Trends in Cyber Security
By
17 October 2016
For my project I am going to discuss cyber security trends.
It always has intrigued me about how network managers adapt
to changes in technology. The cyber security field constantly
challenges the workers to grow and learn new things. I am
excited to research network penetration, cyber investigations,
and assessing overall network security for different
organizations.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the
global penetration of Sony Corp.'s rootkit installations on
computers. By using the Domain Name System (DNS), he was
able to trace connections to a Sony Web site and estimate the
extent to which personal computers had been infected by the
Sony rootkit installation, which sent information to Sony about
computer users' music copying and also made it difficult for
purchasers of Sony Music to copy their music to iTunes or other
music players.
Metasploit Penetration Testing Cookbook. (2013). Network
Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9
Metasploit is a favorite tool of people wearing white hats, black
hats and every shade in between. As a penetration testing tool,
it is immensely powerful (sometimes dangerously so). And the
same goes for its use as aa hacking tool. This is a very
interesting article showing how powerful tools can be used for
both good and bad.
Sández, M. R. (2015). A Review of Technical Problems when
Conducting an Investigation in Cloud Based Environments.
This article shines the light on how difficult it is to maintain
security and adopt new technologies. It explains how cloud base
computing has done wonders for businesses by making
resources easier to access and cheaper. It also divulges how
criminals can steal data from clouds and also hide nefarious
data in other peoples’ cloud storage.
Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015).
Towards the Forensic Identification and Investigation of
Cloud Hosted Servers through Noninvasive Wiretaps.
doi:10.1109/ARES.2015.77
This article actually gets into the nuts in bolts of conducting a
cyber investigation in a cloud environment. It discusses one of
the big challenges as conducting an investigation when you
might not have the cooperation of the people who own the
server.
Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R.
(2015). Network security and performance testing for health
information system management.
This article discusses the unique challenges that a hospital
presents fornetwork security. One of the main focuses is on
encryption (hospital traffic needs to be secure as it as patient
data in it).
Dixit, S. (2016). Holding the fort: a business case for testing
security. Network Security, 2016(6), 16-18.
doi:10.1016/S1353-4858(16)30059-9
This article talks about what to do when the costs of data
breaches keep skyrocketing year after year. An interesting note
is what can you do when the companies you hire keep being
breached.
I am very excited to write a paper about a personal belief that I
hold close to my heart. Throughout my life I have been
extremely fortunate to have made a couple of decisions that
greatly shaped how I got to where I am in life. Because of this,
the personal belief I want to write about today is no matter how
small you think a decision is, it can shape your life in
unforeseen ways. A person should think long and hard about the
ramifications of the choices they make, where it be in work or
life.
In 2007, I was a young soldier and my Command Sergeant
Major was speaking to us about some new training program
about cyber the Navy was offering and he was telling us it was
the way of the future, and would be highly in demand by
employers and the Army. A couple of us junior soldiers inquired
further and learned that we would have to reenlist to attend this
opportunity, which really discouraged people for obvious
reasons. Well, I elected to reenlist and attend this training and it
shaped my life by giving me great training that was in high
demand by civilian employers. I still work in this field and am
able to provide a great living for my family.
The next example of why my belief matters so much to me that I
will give is the decision to take a spur of the moment
deployment as a contractor in 2012. In 2012, I just started my
career as a contractor at Fort Meade and was extremely happy
with the money I was making. In April I was approached with a
short notice opportunity to deploy to Afghanistan over the
summer and didn’t even really think to much about it and said
Yes. On that deployment I just so happened to meet my wife
with whom I have a son. I never thought I would meet my wife
in Afghanistan.
All of this just goes to show that every decision can alter your
life in huge ways. Looking back on my life, those two decisions
altered the trajectory of my life in completely unforeseen ways.
You never know how important some decisions are until many
years later.
Annotated Bibliography: [insert title here]
By
Justin Basagic
17 October 2016
Here on the first page, before the first resource reference,
include a brief paragraph—just a few sentences—describing the
three trends you’re examining and the research codes you used
for your industry. The six references will appear next. Use APA
format.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the
global penetration of Sony Corp.'s rootkit installations on
computers. By using the Domain Name System (DNS), he was
able to trace connections to a Sony Web site and estimate the
extent to which personal computers had been infected by the
Sony rootkit installation, which sent information to Sony about
computer users' music copying and also made it difficult for
purchasers of Sony Music to copy their music to iTunes or other
music players.
Metasploit Penetration Testing Cookbook. (2013). Network
Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9
Metasploit is a favourite tool of people wearing white hats,
black hats and every shade in between. As a penetration testing
tool, it is immensely powerful (sometimes dangerously so). And
the same goes for its use as a hacking tool.
This article gives a history of moral themes in video
games…[and so on]

More Related Content

Similar to Running head GIVE ME A SHORT TITLE IN CAPS 1G.docx

Information Flowing Through The Bla-To-Pl Projection May
Information Flowing Through The Bla-To-Pl Projection MayInformation Flowing Through The Bla-To-Pl Projection May
Information Flowing Through The Bla-To-Pl Projection MayMonica Turner
 
Help On Essay Writing
Help On Essay WritingHelp On Essay Writing
Help On Essay WritingMelissa Gomez
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can ChantellPantoja184
 
WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1Jeremy Wright
 
49 Common App Transfer Essay Examples Image - A
49 Common App Transfer Essay Examples Image - A49 Common App Transfer Essay Examples Image - A
49 Common App Transfer Essay Examples Image - AMandy Brown
 
Introduction To Abortion Essay. Group launches site to help women self-induce...
Introduction To Abortion Essay. Group launches site to help women self-induce...Introduction To Abortion Essay. Group launches site to help women self-induce...
Introduction To Abortion Essay. Group launches site to help women self-induce...Ciara Hall
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!wmetcalf
 
Document Databases In Online Publishing
Document  Databases In  Online Publishing Document  Databases In  Online Publishing
Document Databases In Online Publishing Irakli Nadareishvili
 
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...Symbiosis Group
 
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...AhmedAdilNafea
 
Postmodernism Essay.pdf
Postmodernism Essay.pdfPostmodernism Essay.pdf
Postmodernism Essay.pdfLinda Roy
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxinfantsuk
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxstilliegeorgiana
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats:  The Advancement of Science of CybersecurityThe Rising Tide Raises All Boats:  The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecuritylaurieannwilliams
 
Practice Sat Essay Prompt.pdf
Practice Sat Essay Prompt.pdfPractice Sat Essay Prompt.pdf
Practice Sat Essay Prompt.pdfEmily Parrish
 
Practice Sat Essay Prompt
Practice Sat Essay PromptPractice Sat Essay Prompt
Practice Sat Essay PromptKaren Goldmas
 

Similar to Running head GIVE ME A SHORT TITLE IN CAPS 1G.docx (20)

Information Flowing Through The Bla-To-Pl Projection May
Information Flowing Through The Bla-To-Pl Projection MayInformation Flowing Through The Bla-To-Pl Projection May
Information Flowing Through The Bla-To-Pl Projection May
 
Help On Essay Writing
Help On Essay WritingHelp On Essay Writing
Help On Essay Writing
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1
 
49 Common App Transfer Essay Examples Image - A
49 Common App Transfer Essay Examples Image - A49 Common App Transfer Essay Examples Image - A
49 Common App Transfer Essay Examples Image - A
 
Introduction To Abortion Essay. Group launches site to help women self-induce...
Introduction To Abortion Essay. Group launches site to help women self-induce...Introduction To Abortion Essay. Group launches site to help women self-induce...
Introduction To Abortion Essay. Group launches site to help women self-induce...
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
Document Databases In Online Publishing
Document  Databases In  Online Publishing Document  Databases In  Online Publishing
Document Databases In Online Publishing
 
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
 
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...
 
Postmodernism Essay
Postmodernism EssayPostmodernism Essay
Postmodernism Essay
 
Postmodernism Essay.pdf
Postmodernism Essay.pdfPostmodernism Essay.pdf
Postmodernism Essay.pdf
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats:  The Advancement of Science of CybersecurityThe Rising Tide Raises All Boats:  The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
 
Practice Sat Essay Prompt.pdf
Practice Sat Essay Prompt.pdfPractice Sat Essay Prompt.pdf
Practice Sat Essay Prompt.pdf
 
Practice Sat Essay Prompt
Practice Sat Essay PromptPractice Sat Essay Prompt
Practice Sat Essay Prompt
 

More from cowinhelen

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxcowinhelen
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxcowinhelen
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxcowinhelen
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxcowinhelen
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docxcowinhelen
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxcowinhelen
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxcowinhelen
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxcowinhelen
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxcowinhelen
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxcowinhelen
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxcowinhelen
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docxcowinhelen
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docxcowinhelen
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docxcowinhelen
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docxcowinhelen
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcowinhelen
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxcowinhelen
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docxcowinhelen
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxcowinhelen
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxcowinhelen
 

More from cowinhelen (20)

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docx
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docx
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docx
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docx
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docx
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docx
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docx
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docx
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docx
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Running head GIVE ME A SHORT TITLE IN CAPS 1G.docx

  • 1. Running head: GIVE ME A SHORT TITLE IN CAPS 1 GIVE ME A SHORT TITLE IN CAPS 3 Give me a title with Upper and Lower case letters Comment by Diana Lucas: Be sure to change this to your actual title – don’t forget to change the title in the both HEADERS as well. Justin Basagic University of Maryland University College Abstract
  • 2. In this paper, I will write a short essay that reflects my belief or passion about a particular part of my professional experience. The essay reflects what I value and what is important to me about my profession. Keywords: decision, military Give me a title with Upper and Lower case letters Comment by Diana Lucas: Be sure to change this to your actual title – don’t forget to change the title in the both HEADERS as well. Do NOT bold this title. Cats are, without a doubt, awesome. While some would challenge their awesomeness, those challengers are sadly mistaken (or possibly allergy-ridden, in which case their feelings are understandable but still mistaken). Not only are cats awesome, however, but they are also the best, a fact that is undeniable due to their totally sweet ninja moves and their stellar senses. Comment by Diana Lucas: Suggest you copy & paste your text into this area. Ensure your text is Times New Roman, 12-pitch, and that your paragraphs are double-spaced. Felines epitomize graceful movement, but they are primarily
  • 3. known for their totally sweet ninja moves. One such movement is the cat’s ability to right itself after falling off the upstairs railing from a dead sleep (and look as it totally meant to do that). Cats are also masters of surprise and have the ability to stuff themselves into obscenely small spaces, only to pop out— ninja-style—and snag their unwitting victims’ feet as they walk by. Cats’ totally sweet ninja moves are possible in large part due to their outstanding and well-honed abilities to smell, hear, and taste, as well as their stellar intuition regarding that which is “good” and “bad.” Annotated Bibliography: Trends in Cyber Security By Justin Basagic 17 October 2016
  • 4. For my project I am going to discuss cyber security trends. It always has intrigued me about how network managers adapt to changes in technology. The cyber security field constantly challenges the workers to grow and learn new things. I am excited to research network penetration, cyber investigations, and assessing overall network security for different organizations. References Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM. Communications Of The ACM, 49(6), 62-68. The author describes a technique he employed to determine the global penetration of Sony Corp.'s rootkit installations on computers. By using the Domain Name System (DNS), he was able to trace connections to a Sony Web site and estimate the extent to which personal computers had been infected by the Sony rootkit installation, which sent information to Sony about computer users' music copying and also made it difficult for purchasers of Sony Music to copy their music to iTunes or other music players. Metasploit Penetration Testing Cookbook. (2013). Network Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9 Metasploit is a favorite tool of people wearing white hats, black hats and every shade in between. As a penetration testing tool, it is immensely powerful (sometimes dangerously so). And the same goes for its use as aa hacking tool. This is a very interesting article showing how powerful tools can be used for both good and bad. Sández, M. R. (2015). A Review of Technical Problems when
  • 5. Conducting an Investigation in Cloud Based Environments. This article shines the light on how difficult it is to maintain security and adopt new technologies. It explains how cloud base computing has done wonders for businesses by making resources easier to access and cheaper. It also divulges how criminals can steal data from clouds and also hide nefarious data in other peoples’ cloud storage. Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015). Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps. doi:10.1109/ARES.2015.77 This article actually gets into the nuts in bolts of conducting a cyber investigation in a cloud environment. It discusses one of the big challenges as conducting an investigation when you might not have the cooperation of the people who own the server. Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R. (2015). Network security and performance testing for health information system management. This article discusses the unique challenges that a hospital presents fornetwork security. One of the main focuses is on encryption (hospital traffic needs to be secure as it as patient data in it). Dixit, S. (2016). Holding the fort: a business case for testing security. Network Security, 2016(6), 16-18. doi:10.1016/S1353-4858(16)30059-9 This article talks about what to do when the costs of data breaches keep skyrocketing year after year. An interesting note is what can you do when the companies you hire keep being breached.
  • 6. Annotated Bibliography: Trends in Cyber Security By 17 October 2016
  • 7. For my project I am going to discuss cyber security trends. It always has intrigued me about how network managers adapt to changes in technology. The cyber security field constantly challenges the workers to grow and learn new things. I am excited to research network penetration, cyber investigations, and assessing overall network security for different organizations. References Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM. Communications Of The ACM, 49(6), 62-68. The author describes a technique he employed to determine the global penetration of Sony Corp.'s rootkit installations on computers. By using the Domain Name System (DNS), he was able to trace connections to a Sony Web site and estimate the extent to which personal computers had been infected by the Sony rootkit installation, which sent information to Sony about computer users' music copying and also made it difficult for purchasers of Sony Music to copy their music to iTunes or other music players. Metasploit Penetration Testing Cookbook. (2013). Network Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9 Metasploit is a favorite tool of people wearing white hats, black hats and every shade in between. As a penetration testing tool, it is immensely powerful (sometimes dangerously so). And the
  • 8. same goes for its use as aa hacking tool. This is a very interesting article showing how powerful tools can be used for both good and bad. Sández, M. R. (2015). A Review of Technical Problems when Conducting an Investigation in Cloud Based Environments. This article shines the light on how difficult it is to maintain security and adopt new technologies. It explains how cloud base computing has done wonders for businesses by making resources easier to access and cheaper. It also divulges how criminals can steal data from clouds and also hide nefarious data in other peoples’ cloud storage. Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015). Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps. doi:10.1109/ARES.2015.77 This article actually gets into the nuts in bolts of conducting a cyber investigation in a cloud environment. It discusses one of the big challenges as conducting an investigation when you might not have the cooperation of the people who own the server. Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R. (2015). Network security and performance testing for health information system management. This article discusses the unique challenges that a hospital presents fornetwork security. One of the main focuses is on encryption (hospital traffic needs to be secure as it as patient data in it). Dixit, S. (2016). Holding the fort: a business case for testing security. Network Security, 2016(6), 16-18. doi:10.1016/S1353-4858(16)30059-9 This article talks about what to do when the costs of data breaches keep skyrocketing year after year. An interesting note is what can you do when the companies you hire keep being breached.
  • 9. I am very excited to write a paper about a personal belief that I hold close to my heart. Throughout my life I have been extremely fortunate to have made a couple of decisions that greatly shaped how I got to where I am in life. Because of this, the personal belief I want to write about today is no matter how small you think a decision is, it can shape your life in unforeseen ways. A person should think long and hard about the ramifications of the choices they make, where it be in work or life. In 2007, I was a young soldier and my Command Sergeant Major was speaking to us about some new training program about cyber the Navy was offering and he was telling us it was
  • 10. the way of the future, and would be highly in demand by employers and the Army. A couple of us junior soldiers inquired further and learned that we would have to reenlist to attend this opportunity, which really discouraged people for obvious reasons. Well, I elected to reenlist and attend this training and it shaped my life by giving me great training that was in high demand by civilian employers. I still work in this field and am able to provide a great living for my family. The next example of why my belief matters so much to me that I will give is the decision to take a spur of the moment deployment as a contractor in 2012. In 2012, I just started my career as a contractor at Fort Meade and was extremely happy with the money I was making. In April I was approached with a short notice opportunity to deploy to Afghanistan over the summer and didn’t even really think to much about it and said Yes. On that deployment I just so happened to meet my wife with whom I have a son. I never thought I would meet my wife in Afghanistan. All of this just goes to show that every decision can alter your life in huge ways. Looking back on my life, those two decisions altered the trajectory of my life in completely unforeseen ways. You never know how important some decisions are until many years later. Annotated Bibliography: [insert title here] By Justin Basagic 17 October 2016
  • 11. Here on the first page, before the first resource reference, include a brief paragraph—just a few sentences—describing the three trends you’re examining and the research codes you used for your industry. The six references will appear next. Use APA format. References Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM. Communications Of The ACM, 49(6), 62-68. The author describes a technique he employed to determine the global penetration of Sony Corp.'s rootkit installations on computers. By using the Domain Name System (DNS), he was able to trace connections to a Sony Web site and estimate the extent to which personal computers had been infected by the Sony rootkit installation, which sent information to Sony about computer users' music copying and also made it difficult for purchasers of Sony Music to copy their music to iTunes or other music players. Metasploit Penetration Testing Cookbook. (2013). Network Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9 Metasploit is a favourite tool of people wearing white hats, black hats and every shade in between. As a penetration testing tool, it is immensely powerful (sometimes dangerously so). And
  • 12. the same goes for its use as a hacking tool. This article gives a history of moral themes in video games…[and so on]