SlideShare a Scribd company logo
1 of 5
Assignment 2
Reflecting on Your Writing: Paraphrasing and Academic
Integrity
As a scholar, knowing how to paraphrase is a critical skill when
accurately reflecting a colleague’s ideas. Effective paraphrasing
is used to articulate a source’s essential ideas but without
directly copying the author’s words or phrases. This week’s
Learning Resources will help you develop effective
paraphrasing skills and avoid unintentional plagiarism.
For this Discussion, you will reflect on your own writing in
relation to paraphrasing and academic integrity. Based on what
you have learned from the week’s Learning Resources, you will
share your thoughts and experiences on paraphrasing and
academic integrity with your colleagues.
To prepare for this Discussion
· Read and Listen to the Learning Resources on paraphrasing
and academic integrity.
· Reflect on your paraphrasing process in relation to academic
integrity. You may even choose to consider your approach to
this specific assignment in relation to summary and academic
integrity.
Due by 06/12/2017
Reference
https://class.waldenu.edu/bbcswebdav/institution/USW1/201770
_07/XX_WCSS/WCSS_6060/artifacts/USW1_WCSS_6060_Wee
k3_Paraphrasing.pdf
http://academicguides.waldenu.edu/writingcenter/apa/citations/i
ntextparenthetical
http://academicguides.waldenu.edu/writingcenter/evidence/citati
ons/incorrect
http://academicguides.waldenu.edu/writingcenter/apa/citations/i
ntextparenthetical
http://waldenwritingcenter.blogspot.com/2014/05/patchwork-
paraphrasing.html
http://academicguides.waldenu.edu/writingcenter/apa/references
/examples
Running Heading: NETWORK SECURITY REPORT
NETWORK SECURITY REPORT 5
Addressed To: Newly Hired Network Security Technicians
Chaston Carter
Network Security Report for New Technicians
As the network security administrator, I write this report to
welcome the newly hired network security technicians and
provide you with the instructions on security. As you all know,
our tasks as network security technicians is to ensure that our
organization is in good condition in terms of security of
information and all information asserts are protected from
security threats. This entails managing the infrastructure of the
network as Jennifer Preffer said about network administrators,
“is responsible for keeping an organization’s computer network
up to date and running smoothly.” (Preffer, 2016). This would
automatically result to a secure network and website of our
organization. Apparently, we are also responsible to responding
to any incidents of attacks of our network. Therefore, today I
would like to discuss on the most prevalent web security threats
in our organization, the hazards they present, and how these
threats are exploiting holes in current security countermeasures.
I would also explain about the actions that should be taken to
prevent existing web security countermeasures from being
exploited. Finally, I would assess the cons and pros of choosing
to implement measures such as firewalls, access control
measures, and cryptographic systems.
Current Prevalent Web Security threats
Insecure Cryptographic Storage Vulnerability
This threat involves the poor encryption of sensitive data. This
vulnerability “is one of the OWASP Top 10 Most
Dangerous Vulnerabilities and has maintained the spot for
various years on the go.” (Panesar, & Nagpal, 2015). This can
be a prevalent vulnerability since our website involves access to
private information from our customers such as credit card
details and social security numbers for our employees. The
users access these information into the corporate database
through the web server interfaced by the website portal. These
vulnerabilities are exploiting holes in the present security
countermeasures because poorly encrypted data can now be
decrypted using current advanced methods. “Poorly designed
cryptographic algorithms may include use of inappropriate
ciphers, weak encryption method and poor key handling. This
flaw can lead to sensitive information disclosure to attackers.
This is very dangerous for e-commerce websites.” (Infonsec,
2015).
Broken Session Management and authentication
Sometimes our clients and users may not handle login sessions
well. For instance, they may forget to logout or close browser
after accessing their profiles over the website which may result
to vulnerabilities if the cookies involved are not made invalid
for the user automatically. Lack of proper information of the
users on managing their sessions makes it easier for the
vulnerability to exploit holes in the present countermeasures.
(Huluka & Popov, 2012). An attacker can exploit this
vulnerability to hijack session and make modification or
disclosure to unauthorized information.
Actions to control exploitation
To prevent the security countermeasures from being exploited,
we should keep up to date the security policy as per the OWASP
standard for verifying web application security. Also,
mechanisms should be made to avoid exposure of credentials in
logs and URLs. Also, avoiding XSS flaws that could result to
session stealing should be avoided in all ways.
Strong algorithm standard for cryptography should be used to
encrypt sensitive information and credentials. Its recommended
to use the accepted public algorithms like RSA, SHA-256 and
AES public keys. Also, the database backups that are offsite
should be encrypted in case the web server is compromised.
(Mahajan & Sachdeva, 2013).
Pros and Cons of Security measures
Firewall is very good in filtering packets in and out of the
private network of the organization through the website by
comparing them with standardized policy of information. This
ensures that dangerous communication are not allowed.
However, some policies may result to limitations and restriction
even to safe communications.
Cryptographic systems are important in ensuring communication
data integrity and authenticity hence protect sensitive
information. However, it result to extra task of encrypting and
decrypting which limits processing time and flexibility of data
access.
Access control measures like gates and door locks are important
in preventing physical access to information infrastructure.
However, it does not prevent logical attacks through the
network and communication media.
Therefore, I would recommend the new technicians to look
security of the network in all dimensions and apply layered
security for maximum protection. I am looking forward to work
with you to maintain the current security measures that are
implemented in our organization.
References
Preffer, J. (2016). “What Does a Network Administrator Do? A
Behind-the-Scenes Look”. Retrieved June 4, 2017 from
http://www.rasmussen.edu/degrees/technology/blog/what-does-
a-network-administrator-do/
Panesar, A., & Nagpal, B. (2015). Insecure Cryptographic
Storage Vulnerability: Causes, Prevention and Detection.
Infosec. (2015). “Protect Data by Preventing Insecure
Cryptographic Storage.” Retrieved June 4, 2017 from
http://resources.infosecinstitute.com/protect-data-by-
preventing-insecure-cryptographic-storage/#gref
Mahajan, P., & Sachdeva, A. (2013). A Study of Encryption
Algorithms AES, DES and RSA for security. Global Journal of
Computer Science and Technology, 13(15).
Huluka, D., & Popov, O. (2012, June). Root cause analysis of
session management and broken authentication vulnerabilities.
In Internet Security (WorldCIS), 2012 World Congress on (pp.
82-86). IEEE.

More Related Content

Similar to Assignment 2Reflecting on Your Writing Paraphrasing and Academi.docx

Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage PreventionIRJET Journal
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code ProtectionPerforce
 
A5: Security Misconfiguration
A5: Security Misconfiguration A5: Security Misconfiguration
A5: Security Misconfiguration Tariq Islam
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxjeanettehully
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09technext1
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From MalwareRishu Mehra
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Running head ASSESSMENT TEST1ASSESSMENT TEST1.docx
Running head ASSESSMENT TEST1ASSESSMENT TEST1.docxRunning head ASSESSMENT TEST1ASSESSMENT TEST1.docx
Running head ASSESSMENT TEST1ASSESSMENT TEST1.docxtoddr4
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...IJNSA Journal
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework helpOlivia Fournier
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020developeronrents
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words ansachazerbelq9l
 
5 Best Practices For Network Security
5 Best Practices For Network Security5 Best Practices For Network Security
5 Best Practices For Network Securitytopseowebmaster
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfasiyahanif9977
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfasiyahanif9977
 

Similar to Assignment 2Reflecting on Your Writing Paraphrasing and Academi.docx (20)

Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 
A5: Security Misconfiguration
A5: Security Misconfiguration A5: Security Misconfiguration
A5: Security Misconfiguration
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Running head ASSESSMENT TEST1ASSESSMENT TEST1.docx
Running head ASSESSMENT TEST1ASSESSMENT TEST1.docxRunning head ASSESSMENT TEST1ASSESSMENT TEST1.docx
Running head ASSESSMENT TEST1ASSESSMENT TEST1.docx
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 
5 Best Practices For Network Security
5 Best Practices For Network Security5 Best Practices For Network Security
5 Best Practices For Network Security
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
 

More from rock73

In a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxIn a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxrock73
 
In a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxIn a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxrock73
 
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxIn a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxrock73
 
In a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxIn a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxrock73
 
in a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxin a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxrock73
 
In a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxIn a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxrock73
 
In a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxIn a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxrock73
 
In a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxIn a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxrock73
 
In a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxIn a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxrock73
 
In a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxIn a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxrock73
 
In a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxIn a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxrock73
 
in a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxin a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxrock73
 
In a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxIn a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxrock73
 
In a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxIn a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxrock73
 
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxBASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxrock73
 
Based on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxBased on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxrock73
 
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
Barbara Corcoran Learns Her Heart’s True Desires  In her.docxBarbara Corcoran Learns Her Heart’s True Desires  In her.docx
Barbara Corcoran Learns Her Heart’s True Desires In her.docxrock73
 
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxBapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxrock73
 
Barriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxBarriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxrock73
 
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxBarada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxrock73
 

More from rock73 (20)

In a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxIn a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docx
 
In a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxIn a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docx
 
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxIn a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
 
In a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxIn a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docx
 
in a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxin a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docx
 
In a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxIn a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docx
 
In a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxIn a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docx
 
In a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxIn a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docx
 
In a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxIn a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docx
 
In a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxIn a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docx
 
In a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxIn a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docx
 
in a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxin a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docx
 
In a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxIn a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docx
 
In a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxIn a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docx
 
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxBASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
 
Based on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxBased on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docx
 
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
Barbara Corcoran Learns Her Heart’s True Desires  In her.docxBarbara Corcoran Learns Her Heart’s True Desires  In her.docx
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
 
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxBapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
 
Barriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxBarriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docx
 
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxBarada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Assignment 2Reflecting on Your Writing Paraphrasing and Academi.docx

  • 1. Assignment 2 Reflecting on Your Writing: Paraphrasing and Academic Integrity As a scholar, knowing how to paraphrase is a critical skill when accurately reflecting a colleague’s ideas. Effective paraphrasing is used to articulate a source’s essential ideas but without directly copying the author’s words or phrases. This week’s Learning Resources will help you develop effective paraphrasing skills and avoid unintentional plagiarism. For this Discussion, you will reflect on your own writing in relation to paraphrasing and academic integrity. Based on what you have learned from the week’s Learning Resources, you will share your thoughts and experiences on paraphrasing and academic integrity with your colleagues. To prepare for this Discussion · Read and Listen to the Learning Resources on paraphrasing and academic integrity. · Reflect on your paraphrasing process in relation to academic integrity. You may even choose to consider your approach to this specific assignment in relation to summary and academic integrity. Due by 06/12/2017 Reference https://class.waldenu.edu/bbcswebdav/institution/USW1/201770 _07/XX_WCSS/WCSS_6060/artifacts/USW1_WCSS_6060_Wee k3_Paraphrasing.pdf http://academicguides.waldenu.edu/writingcenter/apa/citations/i ntextparenthetical http://academicguides.waldenu.edu/writingcenter/evidence/citati ons/incorrect http://academicguides.waldenu.edu/writingcenter/apa/citations/i ntextparenthetical http://waldenwritingcenter.blogspot.com/2014/05/patchwork- paraphrasing.html
  • 2. http://academicguides.waldenu.edu/writingcenter/apa/references /examples Running Heading: NETWORK SECURITY REPORT NETWORK SECURITY REPORT 5 Addressed To: Newly Hired Network Security Technicians Chaston Carter Network Security Report for New Technicians As the network security administrator, I write this report to welcome the newly hired network security technicians and provide you with the instructions on security. As you all know, our tasks as network security technicians is to ensure that our organization is in good condition in terms of security of information and all information asserts are protected from security threats. This entails managing the infrastructure of the network as Jennifer Preffer said about network administrators, “is responsible for keeping an organization’s computer network up to date and running smoothly.” (Preffer, 2016). This would automatically result to a secure network and website of our organization. Apparently, we are also responsible to responding to any incidents of attacks of our network. Therefore, today I would like to discuss on the most prevalent web security threats in our organization, the hazards they present, and how these threats are exploiting holes in current security countermeasures. I would also explain about the actions that should be taken to prevent existing web security countermeasures from being exploited. Finally, I would assess the cons and pros of choosing to implement measures such as firewalls, access control measures, and cryptographic systems. Current Prevalent Web Security threats Insecure Cryptographic Storage Vulnerability This threat involves the poor encryption of sensitive data. This vulnerability “is one of the OWASP Top 10 Most Dangerous Vulnerabilities and has maintained the spot for various years on the go.” (Panesar, & Nagpal, 2015). This can be a prevalent vulnerability since our website involves access to
  • 3. private information from our customers such as credit card details and social security numbers for our employees. The users access these information into the corporate database through the web server interfaced by the website portal. These vulnerabilities are exploiting holes in the present security countermeasures because poorly encrypted data can now be decrypted using current advanced methods. “Poorly designed cryptographic algorithms may include use of inappropriate ciphers, weak encryption method and poor key handling. This flaw can lead to sensitive information disclosure to attackers. This is very dangerous for e-commerce websites.” (Infonsec, 2015). Broken Session Management and authentication Sometimes our clients and users may not handle login sessions well. For instance, they may forget to logout or close browser after accessing their profiles over the website which may result to vulnerabilities if the cookies involved are not made invalid for the user automatically. Lack of proper information of the users on managing their sessions makes it easier for the vulnerability to exploit holes in the present countermeasures. (Huluka & Popov, 2012). An attacker can exploit this vulnerability to hijack session and make modification or disclosure to unauthorized information. Actions to control exploitation To prevent the security countermeasures from being exploited, we should keep up to date the security policy as per the OWASP standard for verifying web application security. Also, mechanisms should be made to avoid exposure of credentials in logs and URLs. Also, avoiding XSS flaws that could result to session stealing should be avoided in all ways. Strong algorithm standard for cryptography should be used to encrypt sensitive information and credentials. Its recommended to use the accepted public algorithms like RSA, SHA-256 and AES public keys. Also, the database backups that are offsite should be encrypted in case the web server is compromised. (Mahajan & Sachdeva, 2013).
  • 4. Pros and Cons of Security measures Firewall is very good in filtering packets in and out of the private network of the organization through the website by comparing them with standardized policy of information. This ensures that dangerous communication are not allowed. However, some policies may result to limitations and restriction even to safe communications. Cryptographic systems are important in ensuring communication data integrity and authenticity hence protect sensitive information. However, it result to extra task of encrypting and decrypting which limits processing time and flexibility of data access. Access control measures like gates and door locks are important in preventing physical access to information infrastructure. However, it does not prevent logical attacks through the network and communication media. Therefore, I would recommend the new technicians to look security of the network in all dimensions and apply layered security for maximum protection. I am looking forward to work with you to maintain the current security measures that are implemented in our organization. References Preffer, J. (2016). “What Does a Network Administrator Do? A Behind-the-Scenes Look”. Retrieved June 4, 2017 from http://www.rasmussen.edu/degrees/technology/blog/what-does- a-network-administrator-do/ Panesar, A., & Nagpal, B. (2015). Insecure Cryptographic Storage Vulnerability: Causes, Prevention and Detection. Infosec. (2015). “Protect Data by Preventing Insecure Cryptographic Storage.” Retrieved June 4, 2017 from http://resources.infosecinstitute.com/protect-data-by- preventing-insecure-cryptographic-storage/#gref Mahajan, P., & Sachdeva, A. (2013). A Study of Encryption Algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology, 13(15).
  • 5. Huluka, D., & Popov, O. (2012, June). Root cause analysis of session management and broken authentication vulnerabilities. In Internet Security (WorldCIS), 2012 World Congress on (pp. 82-86). IEEE.