Assignment 2
Reflecting on Your Writing: Paraphrasing and Academic Integrity
As a scholar, knowing how to paraphrase is a critical skill when accurately reflecting a colleague’s ideas. Effective paraphrasing is used to articulate a source’s essential ideas but without directly copying the author’s words or phrases. This week’s Learning Resources will help you develop effective paraphrasing skills and avoid unintentional plagiarism.
For this Discussion, you will reflect on your own writing in relation to paraphrasing and academic integrity. Based on what you have learned from the week’s Learning Resources, you will share your thoughts and experiences on paraphrasing and academic integrity with your colleagues.
To prepare for this Discussion
· Read and Listen to the Learning Resources on paraphrasing and academic integrity.
· Reflect on your paraphrasing process in relation to academic integrity. You may even choose to consider your approach to this specific assignment in relation to summary and academic integrity.
Due by 06/12/2017
Reference
https://class.waldenu.edu/bbcswebdav/institution/USW1/201770_07/XX_WCSS/WCSS_6060/artifacts/USW1_WCSS_6060_Week3_Paraphrasing.pdf
http://academicguides.waldenu.edu/writingcenter/apa/citations/intextparenthetical
http://academicguides.waldenu.edu/writingcenter/evidence/citations/incorrect
http://academicguides.waldenu.edu/writingcenter/apa/citations/intextparenthetical
http://waldenwritingcenter.blogspot.com/2014/05/patchwork-paraphrasing.html
http://academicguides.waldenu.edu/writingcenter/apa/references/examples
Running Heading: NETWORK SECURITY REPORT
NETWORK SECURITY REPORT 5
Addressed To: Newly Hired Network Security Technicians
Chaston Carter
Network Security Report for New Technicians
As the network security administrator, I write this report to welcome the newly hired network security technicians and provide you with the instructions on security. As you all know, our tasks as network security technicians is to ensure that our organization is in good condition in terms of security of information and all information asserts are protected from security threats. This entails managing the infrastructure of the network as Jennifer Preffer said about network administrators, “is responsible for keeping an organization’s computer network up to date and running smoothly.” (Preffer, 2016). This would automatically result to a secure network and website of our organization. Apparently, we are also responsible to responding to any incidents of attacks of our network. Therefore, today I would like to discuss on the most prevalent web security threats in our organization, the hazards they present, and how these threats are exploiting holes in current security countermeasures. I would also explain about the actions that should be taken to prevent existing web security countermeasures from being exploited. Finally, I would assess the cons and pros of choosing to implement measures such as firewalls, access cont ...
Science 7 - LAND and SEA BREEZE and its Characteristics
Assignment 2Reflecting on Your Writing Paraphrasing and Academi.docx
1. Assignment 2
Reflecting on Your Writing: Paraphrasing and Academic
Integrity
As a scholar, knowing how to paraphrase is a critical skill when
accurately reflecting a colleague’s ideas. Effective paraphrasing
is used to articulate a source’s essential ideas but without
directly copying the author’s words or phrases. This week’s
Learning Resources will help you develop effective
paraphrasing skills and avoid unintentional plagiarism.
For this Discussion, you will reflect on your own writing in
relation to paraphrasing and academic integrity. Based on what
you have learned from the week’s Learning Resources, you will
share your thoughts and experiences on paraphrasing and
academic integrity with your colleagues.
To prepare for this Discussion
· Read and Listen to the Learning Resources on paraphrasing
and academic integrity.
· Reflect on your paraphrasing process in relation to academic
integrity. You may even choose to consider your approach to
this specific assignment in relation to summary and academic
integrity.
Due by 06/12/2017
Reference
https://class.waldenu.edu/bbcswebdav/institution/USW1/201770
_07/XX_WCSS/WCSS_6060/artifacts/USW1_WCSS_6060_Wee
k3_Paraphrasing.pdf
http://academicguides.waldenu.edu/writingcenter/apa/citations/i
ntextparenthetical
http://academicguides.waldenu.edu/writingcenter/evidence/citati
ons/incorrect
http://academicguides.waldenu.edu/writingcenter/apa/citations/i
ntextparenthetical
http://waldenwritingcenter.blogspot.com/2014/05/patchwork-
paraphrasing.html
2. http://academicguides.waldenu.edu/writingcenter/apa/references
/examples
Running Heading: NETWORK SECURITY REPORT
NETWORK SECURITY REPORT 5
Addressed To: Newly Hired Network Security Technicians
Chaston Carter
Network Security Report for New Technicians
As the network security administrator, I write this report to
welcome the newly hired network security technicians and
provide you with the instructions on security. As you all know,
our tasks as network security technicians is to ensure that our
organization is in good condition in terms of security of
information and all information asserts are protected from
security threats. This entails managing the infrastructure of the
network as Jennifer Preffer said about network administrators,
“is responsible for keeping an organization’s computer network
up to date and running smoothly.” (Preffer, 2016). This would
automatically result to a secure network and website of our
organization. Apparently, we are also responsible to responding
to any incidents of attacks of our network. Therefore, today I
would like to discuss on the most prevalent web security threats
in our organization, the hazards they present, and how these
threats are exploiting holes in current security countermeasures.
I would also explain about the actions that should be taken to
prevent existing web security countermeasures from being
exploited. Finally, I would assess the cons and pros of choosing
to implement measures such as firewalls, access control
measures, and cryptographic systems.
Current Prevalent Web Security threats
Insecure Cryptographic Storage Vulnerability
This threat involves the poor encryption of sensitive data. This
vulnerability “is one of the OWASP Top 10 Most
Dangerous Vulnerabilities and has maintained the spot for
various years on the go.” (Panesar, & Nagpal, 2015). This can
be a prevalent vulnerability since our website involves access to
3. private information from our customers such as credit card
details and social security numbers for our employees. The
users access these information into the corporate database
through the web server interfaced by the website portal. These
vulnerabilities are exploiting holes in the present security
countermeasures because poorly encrypted data can now be
decrypted using current advanced methods. “Poorly designed
cryptographic algorithms may include use of inappropriate
ciphers, weak encryption method and poor key handling. This
flaw can lead to sensitive information disclosure to attackers.
This is very dangerous for e-commerce websites.” (Infonsec,
2015).
Broken Session Management and authentication
Sometimes our clients and users may not handle login sessions
well. For instance, they may forget to logout or close browser
after accessing their profiles over the website which may result
to vulnerabilities if the cookies involved are not made invalid
for the user automatically. Lack of proper information of the
users on managing their sessions makes it easier for the
vulnerability to exploit holes in the present countermeasures.
(Huluka & Popov, 2012). An attacker can exploit this
vulnerability to hijack session and make modification or
disclosure to unauthorized information.
Actions to control exploitation
To prevent the security countermeasures from being exploited,
we should keep up to date the security policy as per the OWASP
standard for verifying web application security. Also,
mechanisms should be made to avoid exposure of credentials in
logs and URLs. Also, avoiding XSS flaws that could result to
session stealing should be avoided in all ways.
Strong algorithm standard for cryptography should be used to
encrypt sensitive information and credentials. Its recommended
to use the accepted public algorithms like RSA, SHA-256 and
AES public keys. Also, the database backups that are offsite
should be encrypted in case the web server is compromised.
(Mahajan & Sachdeva, 2013).
4. Pros and Cons of Security measures
Firewall is very good in filtering packets in and out of the
private network of the organization through the website by
comparing them with standardized policy of information. This
ensures that dangerous communication are not allowed.
However, some policies may result to limitations and restriction
even to safe communications.
Cryptographic systems are important in ensuring communication
data integrity and authenticity hence protect sensitive
information. However, it result to extra task of encrypting and
decrypting which limits processing time and flexibility of data
access.
Access control measures like gates and door locks are important
in preventing physical access to information infrastructure.
However, it does not prevent logical attacks through the
network and communication media.
Therefore, I would recommend the new technicians to look
security of the network in all dimensions and apply layered
security for maximum protection. I am looking forward to work
with you to maintain the current security measures that are
implemented in our organization.
References
Preffer, J. (2016). “What Does a Network Administrator Do? A
Behind-the-Scenes Look”. Retrieved June 4, 2017 from
http://www.rasmussen.edu/degrees/technology/blog/what-does-
a-network-administrator-do/
Panesar, A., & Nagpal, B. (2015). Insecure Cryptographic
Storage Vulnerability: Causes, Prevention and Detection.
Infosec. (2015). “Protect Data by Preventing Insecure
Cryptographic Storage.” Retrieved June 4, 2017 from
http://resources.infosecinstitute.com/protect-data-by-
preventing-insecure-cryptographic-storage/#gref
Mahajan, P., & Sachdeva, A. (2013). A Study of Encryption
Algorithms AES, DES and RSA for security. Global Journal of
Computer Science and Technology, 13(15).
5. Huluka, D., & Popov, O. (2012, June). Root cause analysis of
session management and broken authentication vulnerabilities.
In Internet Security (WorldCIS), 2012 World Congress on (pp.
82-86). IEEE.