Running head: GIVE ME A SHORT TITLE IN CAPS 1
GIVE ME A SHORT TITLE IN CAPS 3
Give me a title with Upper and Lower case letters Comment by Diana Lucas: Be sure to change this to your actual title – don’t forget to change the title in the both HEADERS as well.
Justin Basagic
University of Maryland University College
Abstract
In this paper, I will write a short essay that reflects my belief or passion about a particular part of my professional experience. The essay reflects what I value and what is important to me about my profession.
Keywords: decision, military
Give me a title with Upper and Lower case letters Comment by Diana Lucas: Be sure to change this to your actual title – don’t forget to change the title in the both HEADERS as well. Do NOT bold this title.
Cats are, without a doubt, awesome. While some would challenge their awesomeness, those challengers are sadly mistaken (or possibly allergy-ridden, in which case their feelings are understandable but still mistaken). Not only are cats awesome, however, but they are also the best, a fact that is undeniable due to their totally sweet ninja moves and their stellar senses. Comment by Diana Lucas: Suggest you copy & paste your text into this area. Ensure your text is Times New Roman, 12-pitch, and that your paragraphs are double-spaced.
Felines epitomize graceful movement, but they are primarily known for their totally sweet ninja moves. One such movement is the cat’s ability to right itself after falling off the upstairs railing from a dead sleep (and look as it totally meant to do that). Cats are also masters of surprise and have the ability to stuff themselves into obscenely small spaces, only to pop out—ninja-style—and snag their unwitting victims’ feet as they walk by.
Cats’ totally sweet ninja moves are possible in large part due to their outstanding and well-honed abilities to smell, hear, and taste, as well as their stellar intuition regarding that which is “good” and “bad.”
Annotated Bibliography: Trends in Cyber Security
By
Justin Basagic
17 October 2016
For my project I am going to discuss cyber security trends. It always has intrigued me about how network managers adapt to changes in technology. The cyber security field constantly challenges the workers to grow and learn new things. I am excited to research network penetration, cyber investigations, and assessing overall network security for different organizations.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the global penetration of Sony Corp.'s rootkit installations on computers. By using the Domain Name System (DNS), he was able to trace connections to a Sony Web site and estimate the extent to which personal computers had been infected by the Sony rootkit ...
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Running head GIVE ME A SHORT TITLE IN CAPS 1G.docx
1. Running head: GIVE ME A SHORT TITLE IN CAPS
1
GIVE ME A SHORT TITLE IN CAPS
3
Give me a title with Upper and Lower case letters Comment by
Diana Lucas: Be sure to change this to your actual title – don’t
forget to change the title in the both HEADERS as well.
Justin Basagic
University of Maryland University College
Abstract
2. In this paper, I will write a short essay that reflects my belief or
passion about a particular part of my professional experience.
The essay reflects what I value and what is important to me
about my profession.
Keywords: decision, military
Give me a title with Upper and Lower case letters Comment by
Diana Lucas: Be sure to change this to your actual title – don’t
forget to change the title in the both HEADERS as well. Do
NOT bold this title.
Cats are, without a doubt, awesome. While some would
challenge their awesomeness, those challengers are sadly
mistaken (or possibly allergy-ridden, in which case their
feelings are understandable but still mistaken). Not only are
cats awesome, however, but they are also the best, a fact that is
undeniable due to their totally sweet ninja moves and their
stellar senses. Comment by Diana Lucas: Suggest you copy &
paste your text into this area. Ensure your text is Times New
Roman, 12-pitch, and that your paragraphs are double-spaced.
Felines epitomize graceful movement, but they are primarily
3. known for their totally sweet ninja moves. One such movement
is the cat’s ability to right itself after falling off the upstairs
railing from a dead sleep (and look as it totally meant to do
that). Cats are also masters of surprise and have the ability to
stuff themselves into obscenely small spaces, only to pop out—
ninja-style—and snag their unwitting victims’ feet as they walk
by.
Cats’ totally sweet ninja moves are possible in large part due to
their outstanding and well-honed abilities to smell, hear, and
taste, as well as their stellar intuition regarding that which is
“good” and “bad.”
Annotated Bibliography: Trends in Cyber Security
By
Justin Basagic
17 October 2016
4. For my project I am going to discuss cyber security trends.
It always has intrigued me about how network managers adapt
to changes in technology. The cyber security field constantly
challenges the workers to grow and learn new things. I am
excited to research network penetration, cyber investigations,
and assessing overall network security for different
organizations.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the
global penetration of Sony Corp.'s rootkit installations on
computers. By using the Domain Name System (DNS), he was
able to trace connections to a Sony Web site and estimate the
extent to which personal computers had been infected by the
Sony rootkit installation, which sent information to Sony about
computer users' music copying and also made it difficult for
purchasers of Sony Music to copy their music to iTunes or other
music players.
Metasploit Penetration Testing Cookbook. (2013). Network
Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9
Metasploit is a favorite tool of people wearing white hats, black
hats and every shade in between. As a penetration testing tool,
it is immensely powerful (sometimes dangerously so). And the
same goes for its use as aa hacking tool. This is a very
interesting article showing how powerful tools can be used for
both good and bad.
Sández, M. R. (2015). A Review of Technical Problems when
5. Conducting an Investigation in Cloud Based Environments.
This article shines the light on how difficult it is to maintain
security and adopt new technologies. It explains how cloud base
computing has done wonders for businesses by making
resources easier to access and cheaper. It also divulges how
criminals can steal data from clouds and also hide nefarious
data in other peoples’ cloud storage.
Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015).
Towards the Forensic Identification and Investigation of
Cloud Hosted Servers through Noninvasive Wiretaps.
doi:10.1109/ARES.2015.77
This article actually gets into the nuts in bolts of conducting a
cyber investigation in a cloud environment. It discusses one of
the big challenges as conducting an investigation when you
might not have the cooperation of the people who own the
server.
Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R.
(2015). Network security and performance testing for health
information system management.
This article discusses the unique challenges that a hospital
presents fornetwork security. One of the main focuses is on
encryption (hospital traffic needs to be secure as it as patient
data in it).
Dixit, S. (2016). Holding the fort: a business case for testing
security. Network Security, 2016(6), 16-18.
doi:10.1016/S1353-4858(16)30059-9
This article talks about what to do when the costs of data
breaches keep skyrocketing year after year. An interesting note
is what can you do when the companies you hire keep being
breached.
7. For my project I am going to discuss cyber security trends.
It always has intrigued me about how network managers adapt
to changes in technology. The cyber security field constantly
challenges the workers to grow and learn new things. I am
excited to research network penetration, cyber investigations,
and assessing overall network security for different
organizations.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the
global penetration of Sony Corp.'s rootkit installations on
computers. By using the Domain Name System (DNS), he was
able to trace connections to a Sony Web site and estimate the
extent to which personal computers had been infected by the
Sony rootkit installation, which sent information to Sony about
computer users' music copying and also made it difficult for
purchasers of Sony Music to copy their music to iTunes or other
music players.
Metasploit Penetration Testing Cookbook. (2013). Network
Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9
Metasploit is a favorite tool of people wearing white hats, black
hats and every shade in between. As a penetration testing tool,
it is immensely powerful (sometimes dangerously so). And the
8. same goes for its use as aa hacking tool. This is a very
interesting article showing how powerful tools can be used for
both good and bad.
Sández, M. R. (2015). A Review of Technical Problems when
Conducting an Investigation in Cloud Based Environments.
This article shines the light on how difficult it is to maintain
security and adopt new technologies. It explains how cloud base
computing has done wonders for businesses by making
resources easier to access and cheaper. It also divulges how
criminals can steal data from clouds and also hide nefarious
data in other peoples’ cloud storage.
Schut, H., Scanlon, M., Farina, J., & Le-Khac, N. (2015).
Towards the Forensic Identification and Investigation of
Cloud Hosted Servers through Noninvasive Wiretaps.
doi:10.1109/ARES.2015.77
This article actually gets into the nuts in bolts of conducting a
cyber investigation in a cloud environment. It discusses one of
the big challenges as conducting an investigation when you
might not have the cooperation of the people who own the
server.
Liu, V., Tesfamicael, A. D., Caelli, W., & Sahama, T. R.
(2015). Network security and performance testing for health
information system management.
This article discusses the unique challenges that a hospital
presents fornetwork security. One of the main focuses is on
encryption (hospital traffic needs to be secure as it as patient
data in it).
Dixit, S. (2016). Holding the fort: a business case for testing
security. Network Security, 2016(6), 16-18.
doi:10.1016/S1353-4858(16)30059-9
This article talks about what to do when the costs of data
breaches keep skyrocketing year after year. An interesting note
is what can you do when the companies you hire keep being
breached.
9. I am very excited to write a paper about a personal belief that I
hold close to my heart. Throughout my life I have been
extremely fortunate to have made a couple of decisions that
greatly shaped how I got to where I am in life. Because of this,
the personal belief I want to write about today is no matter how
small you think a decision is, it can shape your life in
unforeseen ways. A person should think long and hard about the
ramifications of the choices they make, where it be in work or
life.
In 2007, I was a young soldier and my Command Sergeant
Major was speaking to us about some new training program
about cyber the Navy was offering and he was telling us it was
10. the way of the future, and would be highly in demand by
employers and the Army. A couple of us junior soldiers inquired
further and learned that we would have to reenlist to attend this
opportunity, which really discouraged people for obvious
reasons. Well, I elected to reenlist and attend this training and it
shaped my life by giving me great training that was in high
demand by civilian employers. I still work in this field and am
able to provide a great living for my family.
The next example of why my belief matters so much to me that I
will give is the decision to take a spur of the moment
deployment as a contractor in 2012. In 2012, I just started my
career as a contractor at Fort Meade and was extremely happy
with the money I was making. In April I was approached with a
short notice opportunity to deploy to Afghanistan over the
summer and didn’t even really think to much about it and said
Yes. On that deployment I just so happened to meet my wife
with whom I have a son. I never thought I would meet my wife
in Afghanistan.
All of this just goes to show that every decision can alter your
life in huge ways. Looking back on my life, those two decisions
altered the trajectory of my life in completely unforeseen ways.
You never know how important some decisions are until many
years later.
Annotated Bibliography: [insert title here]
By
Justin Basagic
17 October 2016
11. Here on the first page, before the first resource reference,
include a brief paragraph—just a few sentences—describing the
three trends you’re examining and the research codes you used
for your industry. The six references will appear next. Use APA
format.
References
Kaminsky, D. (2006). EXPLORATIONS IN NAMESPACE:
WHITE-HAT HACKING ACROSS THE DOMAIN NAME
SYSTEM. Communications Of The ACM, 49(6), 62-68.
The author describes a technique he employed to determine the
global penetration of Sony Corp.'s rootkit installations on
computers. By using the Domain Name System (DNS), he was
able to trace connections to a Sony Web site and estimate the
extent to which personal computers had been infected by the
Sony rootkit installation, which sent information to Sony about
computer users' music copying and also made it difficult for
purchasers of Sony Music to copy their music to iTunes or other
music players.
Metasploit Penetration Testing Cookbook. (2013). Network
Security, 2013(11), 4. doi:10.1016/S1353-4858(13)70125-9
Metasploit is a favourite tool of people wearing white hats,
black hats and every shade in between. As a penetration testing
tool, it is immensely powerful (sometimes dangerously so). And
12. the same goes for its use as a hacking tool.
This article gives a history of moral themes in video
games…[and so on]