Residency Research ISOL 536 Security Architecture and Design Using Resources to Promote Critical Thinking Critical thinking is an integral part of any educational program At UC, we encourage and provide applicable resources for the promotion of critical thinking In order to properly research and complete course papers, proper resources must be utilized Critical Thinking helps us to: Understand the links between ideas. Determine the importance and relevance of arguments and ideas. Recognize, build and appraise arguments. Identify inconsistencies and errors in reasoning. Approach problems in a consistent and systematic way. Reflect on the justification of their own assumptions, beliefs and values. http://www.skillsyouneed.com/learn/critical-thinking.html Researching Using the Critical Questions When using research resources, it is imperative to review the six critical questions and implement that data into your writings. Proper Resources for Research When asked to completed a research paper in the UC School for Computer and Information Sciences, you must use scholarly, peer-reviewed articles. A peer-reviewed article is one that has “been evaluated by several researchers or subject specialist in the academic community prior to accepting it for publication” and is “also known as scholarly or refereed.” Your professor or the UC Librarian team can help you determine whether or not an article is peer-reviewed. Proper Resources for Research Examples of sites with peer-reviewed resources UC Library Site EBSCOhost JSTOR Google Scholar Examples of sites with unacceptable resources PC Magazine Cisco Ars Technica Reddit Proper Format is Important All papers written for courses within the School for Computer and Information Sciences must follow the American Psychological Association (APA) writing style. University Resources The UC Library provides a myriad of online resources to assist students with proper research Resources referring to Information Security can be found inside the UC Library site www.ucumberlands.edu/library Groups Group 1 Group Topic: Meltdown [email protected][email protected][email protected][email protected][email protected][email protected] Group 2 Group Topic: Spectre [email protected][email protected][email protected][email protected][email protected][email protected] Group 3 Group Topic: ZombieLoad [email protected][email protected][email protected][email protected][email protected][email protected] Group 4 Group Topic: RIDL [email protected][email protected][email protected][email protected][email protected] Group 5 Group Topic: Fallout [email protected][email protected][email protected][email protected][email protected] Research Topic Security researchers have discovered major vulnerabilities with the design of Intel chips The vulnerabilities stem from several issues and their immediate remediations create severe loss of performance Each vulnerability is similar but different Res.