SlideShare a Scribd company logo
Running Head: TRENDS IN CYBERSECURITY1
TRENDS IN CYBERSECURITY 5
Trends in Cybersecurity
Student’s Name
Institution
Date
Top Trends in the cybersecurity industry
New components introduced into the ecosystem of computing
allow new attack vectors: IoT is one of the components that
attract cyber attacks, AI-based systems like assistants will
invite attacks since first devices and software will not be built
considering security protocols. The existing systems of cloud
and mobile security will as well be open to attacks as in social
engineering, ransomware and continued Advance Persistent
Threat attacks (Qureshi, 2018). (All the old methods will be
applied with more specialized goals and increased intensity).
Expect high-profit applications like cryptocurrency to attract
various attacks too. Developing protections in these areas is an
ongoing struggle. In this document, we are going to look at
some of the current trends in the cyber-security industry and
emerging issues such Security and Privacy Merge, AI + ML =
forensics and investigations and then focus the research on IoT
security issues (Sharma, Tripathi & Panda, 2018).
Trend 1: Security and Privacy Merge
Even though everybody is still trying to comprehend the new
privacy landscape and maybe because we have not grasped the
new realities. Perhaps it is our ever-increasing focus on privacy
overall and GDPR precisely.
What is evident is that there is an increase in companies seeking
NAC solutions to keep up with all the new compliance
regulations and it is very satisfying to hear that sigh of relief
when a company has implemented their solution.
The global regulatory landscape has given way to the emerging
trend of merging privacy and security roles. The new policies
on privacy laws will require clear, tangible and operational IT
security controls (Lin, 2017). While chief privacy officers and
chief information security officers have clearly defined roles, it
is important for these two roles and their teams to work closely
together to leverage their unique skill sets and knowledge bases
to ensure their organizations comply with their required
regulations and protect their important, sensitive data and
information.
Like peanut butter and jelly or milk and cookies, the security
and privacy fields go better together. Both communities have
started a slow but steady commingling in recent years, all with
the goal of improving information protection measures on a
large scale (Whitmore, Agarwal, & Da Xu, 2015). At the heart
of the convergence of security and privacy is the recognition
that information is an essential tool in every organization
setting. As pressure keeps rising to protect data while also
defending consumer and employee privacy, it's hard to imagine
the two functions will remain siloed for much longer.
Trend 2: AI + ML = forensics and investigations
Artificial Intelligence (AI) and Machine Learning (ML) are
going to be implemented into the arena of practical usage in
cybersecurity – mainly for forensics and identification of
criminals in cyber trials. Investigating security issues is costly
both vis-à-vis time and the proficiency needed. Research
revealed that AI and ML are well positioned to help in these
investigations for obvious reasons, relating to computing power
and specialized programming of what to look for and the ability
to learn (Krumm, 2016). AI and ML enable the clustering and
analysis of massive volumes of data that would otherwise be
impossible to do within a reasonable amount of time even if you
had the best-trained minds in the business working on the
investigation.
Trend 3: IoT security issues
Internet of things is a term that was first established in 1998
which represents objects which incorporates the internet
features. Recently, the concept has gained popularity in a
different organization which has led to the development of
various application programs. Internet of things comprises four
basic components which include information processing,
heterogeneous access, sensing, services, and applications.
Besides, there are additional components which include privacy
and security. The term IOT has gained popularity in almost
every country due to its role in efficiency within different
organization settings. This has led to the development of
application programs which can be used in industries. Some of
the applications include a machine to machine communications,
cyber-physical systems among others.
An Important Emerging Issue: IoT Security issues
Considering the development of the internet of things, there are
various devices which have been developed that can be used in
homes using the same network. IoT will be deployed in more
business usages and scenarios. The risk will rise and eventually
this will cause more issues with a few headlines of devices that
were used to hack networks. The conversation – Whose job it is
to protect organizations in the public and private sector?
Nationwide attacks on large businesses will bring up the
discussion of who should protect a country and a business from
cybersecurity attacks. Should the state and country be active in
defense of the private sector? In the same respect, you wouldn't
expect a bank branch to deploy anti-missile defense systems
against the possibility of an offending country.
Concerning security, IOT shall be vulnerable to a few
challenges concerning security some of the aspects that provide
security threats in the technology include transmission through
the current traditional sensor network, mobile network, and the
old internet. The devices shall communicate to each other
through the internet which is not entirely secure. This shall
jeopardize both the security and privacy of the users (Botta, De
Donato, Persico & Pescapé, 2016). Before using the above-
mentioned devices, measures should be designed to ensure that
there are confidentiality, integrity, and authenticity within the
entire system.
Security in the Internet of Things
Recently the IOT has become a major topic of research with
various institutions trying to find its role in the society. Despite
the benefits of the technology it still has some challenges
especially in aspects of security and privacy. To support the
above-mentioned technology, it is important to analyze it
focusing on the security aspects of the technology. To improve
the security of the devices some important features such as
confidentiality, identification, and integrity the internet of
things shall work differently from the internet in that it shall
focus on some essential aspects like healthcare and medical
care. Thus, all security measures are essential to ensure that it
serves its purpose.
Security is a major aspect of the internet of things technology.
However, there are various challenges in ensuring the security
of the users of all the devices. Laws and regulations are also an
important aspect in the research on the internet of things the
problem shall be discussed. It is important to note that the
weakness in communication security is caused by the small size
of the devices. This is because they have poor processing
power. One of the major security challenges in the IOT is that
the network used over a long period jeopardizes the authenticity
of all the data which is censored. This reduces the level of
confidentiality concerning security.
The reason why the focus is on sensors is to ensure that the
level of privacy is as at the highest level since it is one of the
major problems in the IOT. The mechanism should be adopted
in a move to improve the security of both the human elements
and the various devices. In society, many people are not aware
of how sensors work in our lives which necessitates the need for
regulations to best up to improve the privacy of different
individuals (Rao, Venkat, Shayideep & Jahagirdar, 2016).
Various articles in literature contain procedures designed to
ensure that the problem is solved at early stages. Each user must
know why they are involved in the censoring process.
Security Posture
Various security controls are in place to control the tracking of
the legal documentation and retrieval of the e-discovery
documents. The first control is the gateway software that is
useful in the monitoring, purging and retaining of the instant
message data for the company. This facilitates the backtracking
of the various information that is pertinent to the industry and
enables the company to have all its data within its scope.
Secondly, administrative controls such as screening of the
workers, conducting the security awareness training and
publishing of the various policies, guidelines, standards, and
procedures for the retrieval of the necessary e-discovery
documents. The well laid out procedures and guidelines will
enhance the efficiency of tracking of various information and
documents. Lastly, practicing logical or technological controls
that encompass access control mechanism for the industry,
ensuring proper security devices and configuration of the
infrastructure to enable easy backtracking of the information
and documents (Devi, Rohini & Suganya, 2016). These methods
are very efficient and reliable in ensuring that the e-discovery
documents are retrieved, and legal tracking of any documents.
Personnel securities include; screening of employees,
establishing channels of communication, establishing a strong
culture in security, effective line management and well-laid
process for managing the various staff leaving the company.
Physical securities include; security lighting in the business
premise, intrusion detectors and electronic surveillance, alarm
system and sensors, natural surveillance and physical barriers
like walls and fences. Privacy protection includes health laws
that protect a given individual, data laws concerning an
organization, protection against private information like
taxation and national income and protection against abuse of
one’s body.
Key Management
Crucial management is one of the important areas in every
organization. It is one of the major areas of research. The area
can be described as one of the complicated aspects of
cryptography. Nowadays, researchers are not able to find the
best solutions to the cryptography security problem. There are
some aspects of cryptography which are not yet used such as
Lightweight cryptographic algorithm and higher performance of
sensor node. In a move to improve the security of the various
components in cryptography the main focus shall be laid on the
key areas of the internet of things and more specifically the
network component.
Security Law and Regulations
Security is one of the major issues in every organization.
Before a new technology can be accepted in society, it ought to
have the best feature which assures users of their privacy and
confidentiality. However, while analyzing the internet of things,
it is important to note that currently there are no technology
standards identified in the above-mentioned technology. The
internet of things has some connection to national security.
Therefore, it is important for our country to come up with some
legislation which will control the internet of things. Also,
sound policies and regulations should also be designed urgently
considering the implications which may arise in their absence
(Christain, 2018). Considering the current state of the
technology, it can be seen there is more which needs to be done
concerning security. It is therefore essential to form security
structure which will assure users of their safety while
interacting with the technology.
Conclusion
Recently the internet of things has become an issue of focus and
this expected to grow even in the foreseeable future. Despite the
various measures which are being put in place to improve the
effectiveness of the technology, there are still a few challenges.
In this paper, the security features and the major components
have been reviewed deeply. It is important for organizations to
watch out the current trends in cybersecurity and learn the new
ways used by attackers so that they can know how to protect
their data against certain attacks. Cybersecurity is one of the
ever-changing fields. It is the right of organizations entrusted
with confidential data of customers, employees and other
individuals associated with them to safeguard their information
and ensure that it is used in the rightful purpose as it was
initially intended. Finally, we focus on the various challenge in
the technology. However, it is important to note that the IOT
will bring a lot of security problems.
References
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016).
Integration of cloud computing and internet of things: a
survey. Future Generation Computer Systems, 56, 684-700.
Christain, T., Sengunthar, L., Christian, O., & Mankad, U.
(2018). RFID based Security in Internet of Things: A Study.
Krumm, J. (2016). Ubiquitous computing fundamentals.
Chapman and Hall/CRC.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W.
(2017). A survey on internet of things: Architecture, enabling
technologies, security and privacy, and applications. IEEE
Internet of Things Journal, 4(5), 1125-1142.
Qureshi, K. N. (2018). New Trends in Internet of Things,
Applications, Challenges, and
Solution
s. Telkomnika, 16(3).
Rao, N., Venkat, T., Shayideep, S., & Jahagirdar, J. (2016).
Internet of Things: Security Challenges and
Issues. International Journal of Computer Science Engineering
& Technology, 6(12).
Sharma, A., Tripathi, S. S., & Panda, R. (2018). A Survey on
Internet of Things.
Weber, R. H. (2015). Internet of things: Privacy issues
revisited. Computer Law & Security Review, 31(5), 618-627.
Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of
Things—A survey of topics and trends. Information Systems
Frontiers, 17(2), 261-274.
Devi, G., Rohini, R., & Suganya, P. (2016). INTERNET OF
THINGS: A SURVEY ON PRIVACY AND SECURITYFOR
SMART HOMES. IIOAB JOURNAL, 7(9), 667-674.
Running head: TITLE OF YOUR PAPER 1
Title of Your Paper
Your Name
University of Maryland University College
TITLE OF YOUR PAPER 2
Abstract
(Not required in any course paper – for informational purposes
only)
An abstract is a synopsis of the contents of your paper. It will
begin with your thesis or a one-
sentence statement of the findings. It is not a substitute for an
introduction to your paper. An
abstract is a summary of the main points and argument of the
paper, and should generally be 150
– 200 words and should be written as one paragraph. An
abstract or executive summary should
be able to stand on its own as a separate document. Most
students write the paper before the
abstract as every point in the abstract must be in the paper.
There are no citations in an abstract.
For more information, you can consult this resource:
APA Style Blog
http://blog.apastyle.org/apastyle/abstracts/
TITLE OF YOUR PAPER 3
Title of Your Paper (centered, not bold)
Most papers will begin with an introduction. In APA style, it is
assumed that the first part of
the paper is the introduction, therefore there is no need to title
this section as such. The
introduction should present the problem or issue that will be
addressed in the paper. It should
state why the topic is important, why there is a need to write
about it, and how you have found
and analyzed information to come to some reasoned
conclusions. The introduction will serve as
an advance organizer for the reader. It should be concise and
focused. If it wanders or says
nothing of merit, consider re-thinking what you are trying to
say. Many times, if the meaning of
the writing is unclear, you are not yet clear about your ideas.
Subheadings
Subheadings allow your reader to follow the direction of your
paper, and they will help you
organize your material. Think of subheadings as the levels of an
outline that you might create
before you start writing your paper. The first level subheadings
are equivalent to the Roman
numeral level of an outline, and should be bold and centered in
title case. The subsequent levels
will be progressively different. The letter (A,B,C) level of your
outline will be the second-level
subheading and will be left-aligned, bold, and in upper and
lower case. The Arabic number level
of your outline will be the third-level subheading and will be
indented, in lower case text and
will end with a period. The body text will begin just after the
period. That is about the extent of
the headings you will use in most classes, but you can consult
this APA helpful blog for more
details.
http://apaformat.org/apa-headings-and-subheadings/
TITLE OF YOUR PAPER 4
Spacing (This is a
first level heading.)
Your entire paper will be double-spaced, with the first line of
each paragraph spaced or
tabbed. APA calls for writers to use Times New Roman because
it is a clear type font and the
12-point size is eminently readable. When you set up your paper
from the cover sheet, you will
set your margins at 1 inch all around. Use left alignment except
in the case of your cover sheet
and headings. Do not use right justify for your paper.
Citing Your Sources
In-text citations are used to give credit to other authors for their
ideas. You will also always
cite specific facts that are not your own and any quoted material
in the body of the text. An in-
text citation should be in parenthesis and include the last name
of the author followed by a
comma and date of publication (Name, Year). When there are
two authors, an ampersand (&) is
used. When there are more than two authors, the rules get more
specific, so please refer to the
APA examples guidance from the UMUC library.
Direct Quotes (This is a second level heading.)
Direct quotes must also have a page number or para associated
with the citation. They are
formatted like this (p. x). Depending upon the placement of the
in-text reference, the page
number can be placed in the same parenthesis as the author and
year, or in a separate parenthesis.
Short direct quotes should appear in the body of the narrative
with quotation marks.
Block Quotations
Longer quotes (more than 40 words) should be typed in an
indented block without quotation
marks. Here is more specific guidance to format block
quotations. Avoid over-dependence on
http://sites.umuc.edu/library/libhow/apa_examples.cfm#authors
http://blog.apastyle.org/apastyle/2013/06/block-quotations-in-
apa-style.html
TITLE OF YOUR PAPER 5
others’ ideas. Your paper should not be a series of quoted ideas
from other authors. Even if
cited properly, this will not be your original work, and that is
what is required in graduate school.
It would be helpful to review the keys to effective paraphrasing
to avoid unintentional
plagiarism. You will be served by taking advantage of UMUC’s
academic integrity resources, to
include a review of the academic integrity tutorial. You should
routinely refresh your citation
skills to ensure that your work is above reproach and original.
No date, no page
If a date is not available, use n.d. (no date). If an author’s name
is not available, use the title
of the document in a signal phrase or give the first word or two
of the title in parentheses. If no
page number is available, the citation should include any
information that will help the reader
find the quotation. For example, if the electronic document
contains numbered paragraphs use
para X. If the document contains headings, cite the heading and
paragraph number within the
heading. The rules are flexible here due to necessity as Web
pages use a wide variety of formats.
When there is no author for an article, you will provide the
short title in the “in text” citation.
Refer to the APA examples for no author and a longer
explanation here.
Academic Writing Tips
Please devise a meaningful title for your paper that reflects your
unique thesis statement. For
example, titling your paper “Research Paper” or “Critical
Thinking” is not especially helpful to
your reader. What did you research? More importantly, what did
you find? While a title of “The
Glass Ceiling” is better than “My Report,” it is not as effective
as calling it “How Mentors Help
to Overcome the Glass Ceiling”. In fact, it is better to write the
title as a statement after research,
as you should know the answer to your original research
question.
https://owl.english.purdue.edu/owl/resource/619/1/
http://www.umuc.edu/current-students/learning-
resources/academic-integrity/tutorial/index_lms_html5.html
http://sites.umuc.edu/library/libhow/apa_examples.cfm#authors
http://www.apastyle.org/learn/faqs/web-page-no-author.aspx
TITLE OF YOUR PAPER 6
In general, research papers should be written in past tense since
they typically report on
research/conceptual frameworks that were written in the past.
Phrases like “Piaget says…” are
not appropriate. Instead you would say, “Piaget said …” or
“Piaget found …” APA discourages
the use of first person (e.g., I, me, my). However, first person is
appropriate when the writer is
describing his/her own experience or stating his/her own
opinion (which should ONLY take
place in your well- marked conclusions section). Generally,
phrases like “This paper
discusses…” are preferable to “I will discuss…” Again, the use
of first person would sometimes
be acceptable in the conclusions section, but it is generally
wiser to avoid any use of the first
person in an academic paper. Also, avoid the use of second
person (“you,” “yours”), and
informal language or slang. If you are going to use an acronym,
please spell it out first with the
acronym in parentheses before using the acronym regularly.
Avoid the use of jargon or too
many acronyms when you are writing to a general audience.
Consider the good example of
articles written by journalists who must explain complicated
concepts in clear, understandable
language. An example that comes to my mind is a memorable
article from The New Yorker,
entitled The Matchmaker about a top salesperson for Steinway
pianos in the New York
showroom. In this article, the reader learns about Erica Feidner,
her family and talent, a whole
lot about Steinway pianos, and this woman’s particular gift for
matching unique Steinway
pianos perfectly to specific clients.
Tone
The tone of your paper should be objective. The purpose is to
provide an objective and
balanced presentation. The purpose is not to persuade nor call
readers to action, except perhaps
as part of the conclusions section. Your paper should provide
pros and cons and multiple points
of view. You should seek empirical evidence to support your
thesis and not rely solely on
https://www.newyorker.com/magazine/2001/08/20/matchmaker-
2
TITLE OF YOUR PAPER 7
“armchair theorists.” Your opinion should not be center stage,
as your argument should be based
on fact. If you fairly state the views about an issue, you may
then have the credibility to offer
conclusions.
If there is a grammatical error in the original text, please use
brackets to either correct the
mistake or use [sic] to let your reader know that you did not
make the mistake. For example, if
the original text has a typo, you can use brackets to correct it:
“Be [the] change that you wish to
see in the world.” Here is an example of a mistake that you can
leave “as is” by using [sic]: “I
ain’t ’fraid of no ghost [sic].” (To correct the mistakes – “I’m
not afraid of a ghost” – would take
away from the spirit of the statement, but at the same time, you
want to be sure that your readers
know that you realize the original statement isn’t correct
grammatically.
Use of bold and italics are also discouraged in APA except in
the instances identified above.
They are not typically used within the narrative for emphasis.
(This document is an exception.)
If you refer to the title of a book or publication in your
narrative, it should appear in italics. If
you refer to the title of a journal article, it should appear in
quotation marks.
Tables and Graphs
APA classifies visuals as tables and figures. This includes
graphs, charts, drawings, and
photographs. Tables should be labeled as Table 1, Table 2, and
so on. The title of the table
should be typed on a separate line in title case below the table
number. The title should be in
italics. Both table number and title should be typed at the left
margin. The source for the table
should appear in a note (with the word note in italics) below the
table. See Table and Figures 1
for more on tables, and Tables and Figures 2 for more on
figures from OWL.
https://owl.english.purdue.edu/owl/resource/560/19/
https://owl.english.purdue.edu/owl/resource/560/20/
TITLE OF YOUR PAPER 8
Footnotes are discouraged in APA. Generally, you should try to
integrate the information
into your narrative. If the information is lengthy, it is better to
place it in an appendix (which
should be placed after the reference list). You should be using
in-text citations and a references
list to cite your sources.
Conclusion
The body of your paper should end with a conclusion. You may
have an objective
conclusion, or you may share your thoughts, experiences and
opinions here (and nowhere else in
the paper). You should not begin a completely new path of logic
in the conclusions sections as
you are wrapping up the sum of your argument in this section.
This is a hard section to write
oftentimes, so use the same advice as for the introduction. If
you find that this section has no
depth and does not make any conclusions, step away to clarify
how you want to finish, and come
back to try again.
References
References will be double-spaced with a hanging indent (first
line at left margin and second
subsequent lines indented). Please create this indent by going
into Paragraph and choosing the
indention choice there. Do not count on using the space bar to
manually space the indent. There
should not be an extra line of space between items, and the
items should be double-spaced.
References are listed in alphabetical order by last name of the
first author. If there is no author,
alphabetize the entry by its title.
--insert page break- your References will always be in the
perfect place!
TITLE OF YOUR PAPER 9
References
(centered, in same size and font, not bold)
The following are some common resource types, but you should
consult your style guide or the
UMUC APA examples for details on other types of resources.
Remember that reference
citations will be double-spaced, hang-indented. Refer to this
OWL help on References.
The following formats are just to show the order of things for
different types of resources.
Online journal:
Last name, First initial. (Date). Title with first letter of first
word in caps and rest in lower case
letters. Journal name, Vol (no), page range (x – x). Retrieved
from url or doi
Website:
Last name, First initial. (Date). Title with first letter of first
word in caps and rest in lower case
letters. Website. Retrieved from url or doi
E-book:
Last name, First initial. (Date). Title. Retrieved from url or doi.
(Note that you will not need to
include publishing data unless book is a hard copy.)
Report:
Office or department. (Date). Title using the capitalization rule.
(Publication No.) Retrieved
from url or doi
http://sites.umuc.edu/library/libhow/apa_examples.cfm
https://owl.purdue.edu/owl/research_and_citation/apa_style/apa
_formatting_and_style_guide/reference_list_basic_rules.html
Running head: TRENDS IN MY INDUSTRY 1
Trends in My Industry
John Brown
UMUC
TRENDS IN MY INDUSTRY 2
Trends in My Industry
In this first introductory paragraph, introduce your industry and
identify the top three
trends research has produced. In addition, introduce the reader
to the issue that you will
cover in more depth, which could be one of the trends or
another interesting issue in the
industry.
Top Trends in the Industry
In this section, introduce the three top trends and explain them
briefly explaining
how they are new to the industry and what that portends for the
industry.
Trend 1
For each trend section, you will describe the emerging trend.
Provide enough detail for
your reader to understand the importance of the trend and how it
changes the landscape of
the industry. Be sure to provide proper “in text” citations from
the resources you found on
this trend.
Trend 2 (Use above guidance.)
Trend 3 (Use above guidance.)
An Important Emerging Issue
In this section, provide the results of your deeper research
into one issue or trend. Again,
please provide “in text” citations in APA format.
Conclusions
Based on the above findings, this section will provide
conclusions about the trends and
issue in context to the industry. It is appropriate to discuss areas
of uncertainty that require
further research. Do not introduce anything new here but make
focused conclusions based
TRENDS IN MY INDUSTRY 3
on your synthesis of the ideas from your resources and your
own thoughts.
+++++Insert a page break here so that your References page
always occurs where it should, on a
new page.+++++
TRENDS IN MY INDUSTRY 4
References
(These are examples of APA reference citations. Please refer to
UMUC APA examples or other
guidance that you find helpful from OWL or your copy of the
APA Style Guide.)
Biggs, S., & Nadeau, K. (1992, December). Students with
Attention Deficit Disorder (ADD).
Presented at Chesapeake Psychological Services to members of
Nation's Capital Area
Disability Support Services Coalition. Retrieved from
http://www.adult-
add.org/study/student/study_study_tips.htm
Booth, R. C. (1998). List of appropriate school-based
accommodations and interventions.
Highland Park, Ill.: National Attention Deficit Disorder
Association. Retrieved from
http://www.add.org/content/school/list.htm
General information about Attention-Deficit/Hyperactivity
Disorder fact sheet number 19
(FS19). (1999, August). The Academy for Educational
Development and the Office of
Special Education Programs. Retrieved from http://www.adult-
add.org/study/teacher/study_teach_tips.htm
Hallowell, E. M., & Ratey, J. J. (1994). Driven to distraction:
Recognizing and coping with
Attention Deficit Disorder from childhood through adulthood.
Retrieved from url or doi
Latham, P. H. (2000). Attention Deficit Disorder in college
faculty and students: Partners in
education. National Center for Law and Learning Disabilities.
Article retrieved from
http://www.adult-
add.org/study/student/study_student_college.htm
Robertson, A. S. (2000). ADD/ADHD: What does it mean for
parents and families when their
child is diagnosed with this condition? Retrieved from
http://www.adult-
add.org/medical/research/research_family.htm
https://sites.umuc.edu/library/libhow/apa_examples.cfm
http://www.add.org/content/school/list.htm
http://www.adult-
add.org/study/student/study_student_college.htm
Project: Find Top Trends in Your Profession (industry is
Cybersecurity)
Step 1: Conduct Research to Identify Top Trends (Cyber
Security)
Step 2: Choose an Issue to Research Further
Step 3: Writing your Research Paper
In the previous two steps, you performed searches, first to
identify industry trends, and then for information about an issue
in one of those trends that you consider to be important to your
industry. Now, you should be ready to draft your paper. This
would be a good time to review organization in writing and
paragraphs. You might also review the Effective Writing
Center's Online Guide to Writing, a valuable reference to
students who seek to improve their writing.
Review your tasks. You are to provide a research paper that
provides a summary of the three top trends in your industry
(with associated NAICS codes). Provide sufficient background
for your reader that the trend is clear and supported by
resources you have found. Review resources in References and
Citations to ensure that you are using "in text" citations to give
credit for the ideas of other authors and to build your credibility
as a researcher, neither ignoring sources nor quoting
excessively.
You will develop a paper that accomplishes two objectives:
· It will identify the three top trends in your industry and your
rationale for your choices based on the resources you found;
· It will discuss an issue within one of the trends that you deem
important, based on the current state of the industry, and will be
supported by your analysis of facts and a well-reasoned
conclusion of what it means to the industry.
Start with an outline and flesh out the main themes with
supporting statements. This will become your road map to an
organized paper. Draft, sleep on it, and edit. Repeat.
Your paper will be 5-7 pages, not including your cover page and
References page(s), double-spaced, and set up in APA
standards. It does not require an abstract.
Your citations, both "in text" and in References, will be in
accordance with the APA Style Manual Sixth Edition. You may
also find this sample APA paper helpful.
Your headings will follow this general pattern:
· Paper Title (First level position, not bold)
· Findings (First level heading, centered, bold)
Top Trends of the _____ Industry (Second level heading, bold,
flush left)
An important emerging issue in a trend (and what it means in
context to the industry) (Second level heading, bold, flush left)
· Conclusions (First level heading, centered, bold)
· References (New page, first level position, not bold)
a. cover sheet in good APA format;
b. "template" for your paper that includes the headings;
your opening paragraph that will introduce the industry, the top
trends, the issue that you have chosen, and the question that you
pose to answer; and,
your draft References page.
Use the APA style guide or APA examples to draft your
complete citations.
Before you submit your assignment, review the competencies
below, which your instructor will use to evaluate your work. A
good practice would be to use each competency as a self-check
to confirm you have incorporated all of them in your work.
· 1.1: Organize document or presentation clearly in a manner
that promotes understanding and meets the requirements of the
assignment.
· 1.2: Develop coherent paragraphs or points so that each is
internally unified and so that each functions as part of the whole
document or presentation.
· 1.3: Provide sufficient, correctly cited support that
substantiates the writer’s ideas.
· 1.4: Tailor communications to the audience.
· 1.5: Use sentence structure appropriate to the task, message
and audience.
· 2.1: Identify and clearly explain the issue, question, or
problem under critical consideration.
· 2.2: Locate and access sufficient information to investigate the
issue or problem.
· 2.3: Evaluate the information in a logical and organized
manner to determine its value and relevance to the problem.
· 2.4: Consider and analyze information in context to the issue
or problem.

More Related Content

Similar to Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx

IoT
IoTIoT
IoT
Mphasis
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
oreo10
 
76 s201918
76 s20191876 s201918
76 s201918
IJRAT
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
yashapnt
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
IOSR Journals
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
JPLoft Solutions
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
cowinhelen
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
Max Secure Ltd
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
IRJET Journal
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
Aki Koivu
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
Christopher Wang
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
Deris Stiawan
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 

Similar to Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx (20)

IoT
IoTIoT
IoT
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 
76 s201918
76 s20191876 s201918
76 s201918
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 

More from todd521

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
todd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
todd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
todd521
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docx
todd521
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
todd521
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
todd521
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
todd521
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
todd521
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
todd521
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
todd521
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
todd521
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
todd521
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
todd521
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
todd521
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
todd521
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
todd521
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
todd521
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
todd521
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
todd521
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
todd521
 

More from todd521 (20)

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docx
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
 

Recently uploaded

How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 

Recently uploaded (20)

How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx

  • 1. Running Head: TRENDS IN CYBERSECURITY1 TRENDS IN CYBERSECURITY 5 Trends in Cybersecurity Student’s Name Institution Date Top Trends in the cybersecurity industry New components introduced into the ecosystem of computing allow new attack vectors: IoT is one of the components that attract cyber attacks, AI-based systems like assistants will invite attacks since first devices and software will not be built considering security protocols. The existing systems of cloud and mobile security will as well be open to attacks as in social engineering, ransomware and continued Advance Persistent Threat attacks (Qureshi, 2018). (All the old methods will be applied with more specialized goals and increased intensity). Expect high-profit applications like cryptocurrency to attract various attacks too. Developing protections in these areas is an ongoing struggle. In this document, we are going to look at some of the current trends in the cyber-security industry and emerging issues such Security and Privacy Merge, AI + ML = forensics and investigations and then focus the research on IoT security issues (Sharma, Tripathi & Panda, 2018).
  • 2. Trend 1: Security and Privacy Merge Even though everybody is still trying to comprehend the new privacy landscape and maybe because we have not grasped the new realities. Perhaps it is our ever-increasing focus on privacy overall and GDPR precisely. What is evident is that there is an increase in companies seeking NAC solutions to keep up with all the new compliance regulations and it is very satisfying to hear that sigh of relief when a company has implemented their solution. The global regulatory landscape has given way to the emerging trend of merging privacy and security roles. The new policies on privacy laws will require clear, tangible and operational IT security controls (Lin, 2017). While chief privacy officers and chief information security officers have clearly defined roles, it is important for these two roles and their teams to work closely together to leverage their unique skill sets and knowledge bases to ensure their organizations comply with their required regulations and protect their important, sensitive data and information. Like peanut butter and jelly or milk and cookies, the security and privacy fields go better together. Both communities have started a slow but steady commingling in recent years, all with the goal of improving information protection measures on a large scale (Whitmore, Agarwal, & Da Xu, 2015). At the heart of the convergence of security and privacy is the recognition that information is an essential tool in every organization setting. As pressure keeps rising to protect data while also defending consumer and employee privacy, it's hard to imagine the two functions will remain siloed for much longer. Trend 2: AI + ML = forensics and investigations Artificial Intelligence (AI) and Machine Learning (ML) are going to be implemented into the arena of practical usage in cybersecurity – mainly for forensics and identification of criminals in cyber trials. Investigating security issues is costly both vis-à-vis time and the proficiency needed. Research revealed that AI and ML are well positioned to help in these
  • 3. investigations for obvious reasons, relating to computing power and specialized programming of what to look for and the ability to learn (Krumm, 2016). AI and ML enable the clustering and analysis of massive volumes of data that would otherwise be impossible to do within a reasonable amount of time even if you had the best-trained minds in the business working on the investigation. Trend 3: IoT security issues Internet of things is a term that was first established in 1998 which represents objects which incorporates the internet features. Recently, the concept has gained popularity in a different organization which has led to the development of various application programs. Internet of things comprises four basic components which include information processing, heterogeneous access, sensing, services, and applications. Besides, there are additional components which include privacy and security. The term IOT has gained popularity in almost every country due to its role in efficiency within different organization settings. This has led to the development of application programs which can be used in industries. Some of the applications include a machine to machine communications, cyber-physical systems among others. An Important Emerging Issue: IoT Security issues Considering the development of the internet of things, there are various devices which have been developed that can be used in homes using the same network. IoT will be deployed in more business usages and scenarios. The risk will rise and eventually this will cause more issues with a few headlines of devices that were used to hack networks. The conversation – Whose job it is to protect organizations in the public and private sector? Nationwide attacks on large businesses will bring up the discussion of who should protect a country and a business from cybersecurity attacks. Should the state and country be active in defense of the private sector? In the same respect, you wouldn't expect a bank branch to deploy anti-missile defense systems against the possibility of an offending country.
  • 4. Concerning security, IOT shall be vulnerable to a few challenges concerning security some of the aspects that provide security threats in the technology include transmission through the current traditional sensor network, mobile network, and the old internet. The devices shall communicate to each other through the internet which is not entirely secure. This shall jeopardize both the security and privacy of the users (Botta, De Donato, Persico & Pescapé, 2016). Before using the above- mentioned devices, measures should be designed to ensure that there are confidentiality, integrity, and authenticity within the entire system. Security in the Internet of Things Recently the IOT has become a major topic of research with various institutions trying to find its role in the society. Despite the benefits of the technology it still has some challenges especially in aspects of security and privacy. To support the above-mentioned technology, it is important to analyze it focusing on the security aspects of the technology. To improve the security of the devices some important features such as confidentiality, identification, and integrity the internet of things shall work differently from the internet in that it shall focus on some essential aspects like healthcare and medical care. Thus, all security measures are essential to ensure that it serves its purpose. Security is a major aspect of the internet of things technology. However, there are various challenges in ensuring the security of the users of all the devices. Laws and regulations are also an important aspect in the research on the internet of things the problem shall be discussed. It is important to note that the weakness in communication security is caused by the small size of the devices. This is because they have poor processing power. One of the major security challenges in the IOT is that the network used over a long period jeopardizes the authenticity of all the data which is censored. This reduces the level of confidentiality concerning security. The reason why the focus is on sensors is to ensure that the
  • 5. level of privacy is as at the highest level since it is one of the major problems in the IOT. The mechanism should be adopted in a move to improve the security of both the human elements and the various devices. In society, many people are not aware of how sensors work in our lives which necessitates the need for regulations to best up to improve the privacy of different individuals (Rao, Venkat, Shayideep & Jahagirdar, 2016). Various articles in literature contain procedures designed to ensure that the problem is solved at early stages. Each user must know why they are involved in the censoring process. Security Posture Various security controls are in place to control the tracking of the legal documentation and retrieval of the e-discovery documents. The first control is the gateway software that is useful in the monitoring, purging and retaining of the instant message data for the company. This facilitates the backtracking of the various information that is pertinent to the industry and enables the company to have all its data within its scope. Secondly, administrative controls such as screening of the workers, conducting the security awareness training and publishing of the various policies, guidelines, standards, and procedures for the retrieval of the necessary e-discovery documents. The well laid out procedures and guidelines will enhance the efficiency of tracking of various information and documents. Lastly, practicing logical or technological controls that encompass access control mechanism for the industry, ensuring proper security devices and configuration of the infrastructure to enable easy backtracking of the information and documents (Devi, Rohini & Suganya, 2016). These methods are very efficient and reliable in ensuring that the e-discovery documents are retrieved, and legal tracking of any documents. Personnel securities include; screening of employees, establishing channels of communication, establishing a strong culture in security, effective line management and well-laid process for managing the various staff leaving the company. Physical securities include; security lighting in the business
  • 6. premise, intrusion detectors and electronic surveillance, alarm system and sensors, natural surveillance and physical barriers like walls and fences. Privacy protection includes health laws that protect a given individual, data laws concerning an organization, protection against private information like taxation and national income and protection against abuse of one’s body. Key Management Crucial management is one of the important areas in every organization. It is one of the major areas of research. The area can be described as one of the complicated aspects of cryptography. Nowadays, researchers are not able to find the best solutions to the cryptography security problem. There are some aspects of cryptography which are not yet used such as Lightweight cryptographic algorithm and higher performance of sensor node. In a move to improve the security of the various components in cryptography the main focus shall be laid on the key areas of the internet of things and more specifically the network component. Security Law and Regulations Security is one of the major issues in every organization. Before a new technology can be accepted in society, it ought to have the best feature which assures users of their privacy and confidentiality. However, while analyzing the internet of things, it is important to note that currently there are no technology standards identified in the above-mentioned technology. The internet of things has some connection to national security. Therefore, it is important for our country to come up with some legislation which will control the internet of things. Also, sound policies and regulations should also be designed urgently considering the implications which may arise in their absence (Christain, 2018). Considering the current state of the technology, it can be seen there is more which needs to be done concerning security. It is therefore essential to form security structure which will assure users of their safety while interacting with the technology.
  • 7. Conclusion Recently the internet of things has become an issue of focus and this expected to grow even in the foreseeable future. Despite the various measures which are being put in place to improve the effectiveness of the technology, there are still a few challenges. In this paper, the security features and the major components have been reviewed deeply. It is important for organizations to watch out the current trends in cybersecurity and learn the new ways used by attackers so that they can know how to protect their data against certain attacks. Cybersecurity is one of the ever-changing fields. It is the right of organizations entrusted with confidential data of customers, employees and other individuals associated with them to safeguard their information and ensure that it is used in the rightful purpose as it was initially intended. Finally, we focus on the various challenge in the technology. However, it is important to note that the IOT will bring a lot of security problems. References Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700. Christain, T., Sengunthar, L., Christian, O., & Mankad, U. (2018). RFID based Security in Internet of Things: A Study. Krumm, J. (2016). Ubiquitous computing fundamentals. Chapman and Hall/CRC. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142. Qureshi, K. N. (2018). New Trends in Internet of Things, Applications, Challenges, and
  • 8. Solution s. Telkomnika, 16(3). Rao, N., Venkat, T., Shayideep, S., & Jahagirdar, J. (2016). Internet of Things: Security Challenges and Issues. International Journal of Computer Science Engineering & Technology, 6(12). Sharma, A., Tripathi, S. S., & Panda, R. (2018). A Survey on Internet of Things. Weber, R. H. (2015). Internet of things: Privacy issues revisited. Computer Law & Security Review, 31(5), 618-627. Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261-274. Devi, G., Rohini, R., & Suganya, P. (2016). INTERNET OF THINGS: A SURVEY ON PRIVACY AND SECURITYFOR SMART HOMES. IIOAB JOURNAL, 7(9), 667-674. Running head: TITLE OF YOUR PAPER 1
  • 9. Title of Your Paper Your Name University of Maryland University College
  • 10. TITLE OF YOUR PAPER 2 Abstract (Not required in any course paper – for informational purposes only) An abstract is a synopsis of the contents of your paper. It will begin with your thesis or a one- sentence statement of the findings. It is not a substitute for an introduction to your paper. An abstract is a summary of the main points and argument of the paper, and should generally be 150 – 200 words and should be written as one paragraph. An abstract or executive summary should be able to stand on its own as a separate document. Most students write the paper before the
  • 11. abstract as every point in the abstract must be in the paper. There are no citations in an abstract. For more information, you can consult this resource: APA Style Blog http://blog.apastyle.org/apastyle/abstracts/ TITLE OF YOUR PAPER 3 Title of Your Paper (centered, not bold) Most papers will begin with an introduction. In APA style, it is assumed that the first part of the paper is the introduction, therefore there is no need to title this section as such. The introduction should present the problem or issue that will be addressed in the paper. It should
  • 12. state why the topic is important, why there is a need to write about it, and how you have found and analyzed information to come to some reasoned conclusions. The introduction will serve as an advance organizer for the reader. It should be concise and focused. If it wanders or says nothing of merit, consider re-thinking what you are trying to say. Many times, if the meaning of the writing is unclear, you are not yet clear about your ideas. Subheadings Subheadings allow your reader to follow the direction of your paper, and they will help you organize your material. Think of subheadings as the levels of an outline that you might create before you start writing your paper. The first level subheadings are equivalent to the Roman
  • 13. numeral level of an outline, and should be bold and centered in title case. The subsequent levels will be progressively different. The letter (A,B,C) level of your outline will be the second-level subheading and will be left-aligned, bold, and in upper and lower case. The Arabic number level of your outline will be the third-level subheading and will be indented, in lower case text and will end with a period. The body text will begin just after the period. That is about the extent of the headings you will use in most classes, but you can consult this APA helpful blog for more details. http://apaformat.org/apa-headings-and-subheadings/ TITLE OF YOUR PAPER 4
  • 14. Spacing (This is a first level heading.) Your entire paper will be double-spaced, with the first line of each paragraph spaced or tabbed. APA calls for writers to use Times New Roman because it is a clear type font and the 12-point size is eminently readable. When you set up your paper from the cover sheet, you will set your margins at 1 inch all around. Use left alignment except in the case of your cover sheet and headings. Do not use right justify for your paper. Citing Your Sources In-text citations are used to give credit to other authors for their
  • 15. ideas. You will also always cite specific facts that are not your own and any quoted material in the body of the text. An in- text citation should be in parenthesis and include the last name of the author followed by a comma and date of publication (Name, Year). When there are two authors, an ampersand (&) is used. When there are more than two authors, the rules get more specific, so please refer to the APA examples guidance from the UMUC library. Direct Quotes (This is a second level heading.) Direct quotes must also have a page number or para associated with the citation. They are formatted like this (p. x). Depending upon the placement of the in-text reference, the page
  • 16. number can be placed in the same parenthesis as the author and year, or in a separate parenthesis. Short direct quotes should appear in the body of the narrative with quotation marks. Block Quotations Longer quotes (more than 40 words) should be typed in an indented block without quotation marks. Here is more specific guidance to format block quotations. Avoid over-dependence on http://sites.umuc.edu/library/libhow/apa_examples.cfm#authors http://blog.apastyle.org/apastyle/2013/06/block-quotations-in- apa-style.html TITLE OF YOUR PAPER 5 others’ ideas. Your paper should not be a series of quoted ideas from other authors. Even if
  • 17. cited properly, this will not be your original work, and that is what is required in graduate school. It would be helpful to review the keys to effective paraphrasing to avoid unintentional plagiarism. You will be served by taking advantage of UMUC’s academic integrity resources, to include a review of the academic integrity tutorial. You should routinely refresh your citation skills to ensure that your work is above reproach and original. No date, no page If a date is not available, use n.d. (no date). If an author’s name is not available, use the title of the document in a signal phrase or give the first word or two of the title in parentheses. If no
  • 18. page number is available, the citation should include any information that will help the reader find the quotation. For example, if the electronic document contains numbered paragraphs use para X. If the document contains headings, cite the heading and paragraph number within the heading. The rules are flexible here due to necessity as Web pages use a wide variety of formats. When there is no author for an article, you will provide the short title in the “in text” citation. Refer to the APA examples for no author and a longer explanation here. Academic Writing Tips Please devise a meaningful title for your paper that reflects your unique thesis statement. For
  • 19. example, titling your paper “Research Paper” or “Critical Thinking” is not especially helpful to your reader. What did you research? More importantly, what did you find? While a title of “The Glass Ceiling” is better than “My Report,” it is not as effective as calling it “How Mentors Help to Overcome the Glass Ceiling”. In fact, it is better to write the title as a statement after research, as you should know the answer to your original research question. https://owl.english.purdue.edu/owl/resource/619/1/ http://www.umuc.edu/current-students/learning- resources/academic-integrity/tutorial/index_lms_html5.html http://sites.umuc.edu/library/libhow/apa_examples.cfm#authors http://www.apastyle.org/learn/faqs/web-page-no-author.aspx TITLE OF YOUR PAPER 6
  • 20. In general, research papers should be written in past tense since they typically report on research/conceptual frameworks that were written in the past. Phrases like “Piaget says…” are not appropriate. Instead you would say, “Piaget said …” or “Piaget found …” APA discourages the use of first person (e.g., I, me, my). However, first person is appropriate when the writer is describing his/her own experience or stating his/her own opinion (which should ONLY take place in your well- marked conclusions section). Generally, phrases like “This paper discusses…” are preferable to “I will discuss…” Again, the use of first person would sometimes be acceptable in the conclusions section, but it is generally wiser to avoid any use of the first person in an academic paper. Also, avoid the use of second
  • 21. person (“you,” “yours”), and informal language or slang. If you are going to use an acronym, please spell it out first with the acronym in parentheses before using the acronym regularly. Avoid the use of jargon or too many acronyms when you are writing to a general audience. Consider the good example of articles written by journalists who must explain complicated concepts in clear, understandable language. An example that comes to my mind is a memorable article from The New Yorker, entitled The Matchmaker about a top salesperson for Steinway pianos in the New York showroom. In this article, the reader learns about Erica Feidner, her family and talent, a whole lot about Steinway pianos, and this woman’s particular gift for matching unique Steinway
  • 22. pianos perfectly to specific clients. Tone The tone of your paper should be objective. The purpose is to provide an objective and balanced presentation. The purpose is not to persuade nor call readers to action, except perhaps as part of the conclusions section. Your paper should provide pros and cons and multiple points of view. You should seek empirical evidence to support your thesis and not rely solely on https://www.newyorker.com/magazine/2001/08/20/matchmaker- 2 TITLE OF YOUR PAPER 7
  • 23. “armchair theorists.” Your opinion should not be center stage, as your argument should be based on fact. If you fairly state the views about an issue, you may then have the credibility to offer conclusions. If there is a grammatical error in the original text, please use brackets to either correct the mistake or use [sic] to let your reader know that you did not make the mistake. For example, if the original text has a typo, you can use brackets to correct it: “Be [the] change that you wish to see in the world.” Here is an example of a mistake that you can leave “as is” by using [sic]: “I ain’t ’fraid of no ghost [sic].” (To correct the mistakes – “I’m not afraid of a ghost” – would take away from the spirit of the statement, but at the same time, you want to be sure that your readers
  • 24. know that you realize the original statement isn’t correct grammatically. Use of bold and italics are also discouraged in APA except in the instances identified above. They are not typically used within the narrative for emphasis. (This document is an exception.) If you refer to the title of a book or publication in your narrative, it should appear in italics. If you refer to the title of a journal article, it should appear in quotation marks. Tables and Graphs APA classifies visuals as tables and figures. This includes graphs, charts, drawings, and photographs. Tables should be labeled as Table 1, Table 2, and so on. The title of the table
  • 25. should be typed on a separate line in title case below the table number. The title should be in italics. Both table number and title should be typed at the left margin. The source for the table should appear in a note (with the word note in italics) below the table. See Table and Figures 1 for more on tables, and Tables and Figures 2 for more on figures from OWL. https://owl.english.purdue.edu/owl/resource/560/19/ https://owl.english.purdue.edu/owl/resource/560/20/ TITLE OF YOUR PAPER 8 Footnotes are discouraged in APA. Generally, you should try to integrate the information into your narrative. If the information is lengthy, it is better to place it in an appendix (which
  • 26. should be placed after the reference list). You should be using in-text citations and a references list to cite your sources. Conclusion The body of your paper should end with a conclusion. You may have an objective conclusion, or you may share your thoughts, experiences and opinions here (and nowhere else in the paper). You should not begin a completely new path of logic in the conclusions sections as you are wrapping up the sum of your argument in this section. This is a hard section to write oftentimes, so use the same advice as for the introduction. If you find that this section has no depth and does not make any conclusions, step away to clarify
  • 27. how you want to finish, and come back to try again. References References will be double-spaced with a hanging indent (first line at left margin and second subsequent lines indented). Please create this indent by going into Paragraph and choosing the indention choice there. Do not count on using the space bar to manually space the indent. There should not be an extra line of space between items, and the items should be double-spaced. References are listed in alphabetical order by last name of the first author. If there is no author, alphabetize the entry by its title. --insert page break- your References will always be in the
  • 28. perfect place! TITLE OF YOUR PAPER 9 References (centered, in same size and font, not bold) The following are some common resource types, but you should consult your style guide or the UMUC APA examples for details on other types of resources. Remember that reference citations will be double-spaced, hang-indented. Refer to this OWL help on References. The following formats are just to show the order of things for different types of resources.
  • 29. Online journal: Last name, First initial. (Date). Title with first letter of first word in caps and rest in lower case letters. Journal name, Vol (no), page range (x – x). Retrieved from url or doi Website: Last name, First initial. (Date). Title with first letter of first word in caps and rest in lower case letters. Website. Retrieved from url or doi E-book: Last name, First initial. (Date). Title. Retrieved from url or doi. (Note that you will not need to include publishing data unless book is a hard copy.)
  • 30. Report: Office or department. (Date). Title using the capitalization rule. (Publication No.) Retrieved from url or doi http://sites.umuc.edu/library/libhow/apa_examples.cfm https://owl.purdue.edu/owl/research_and_citation/apa_style/apa _formatting_and_style_guide/reference_list_basic_rules.html Running head: TRENDS IN MY INDUSTRY 1
  • 31. Trends in My Industry John Brown UMUC TRENDS IN MY INDUSTRY 2
  • 32. Trends in My Industry In this first introductory paragraph, introduce your industry and identify the top three trends research has produced. In addition, introduce the reader to the issue that you will cover in more depth, which could be one of the trends or another interesting issue in the industry. Top Trends in the Industry In this section, introduce the three top trends and explain them briefly explaining how they are new to the industry and what that portends for the industry. Trend 1
  • 33. For each trend section, you will describe the emerging trend. Provide enough detail for your reader to understand the importance of the trend and how it changes the landscape of the industry. Be sure to provide proper “in text” citations from the resources you found on this trend. Trend 2 (Use above guidance.) Trend 3 (Use above guidance.) An Important Emerging Issue In this section, provide the results of your deeper research into one issue or trend. Again, please provide “in text” citations in APA format. Conclusions
  • 34. Based on the above findings, this section will provide conclusions about the trends and issue in context to the industry. It is appropriate to discuss areas of uncertainty that require further research. Do not introduce anything new here but make focused conclusions based TRENDS IN MY INDUSTRY 3 on your synthesis of the ideas from your resources and your own thoughts. +++++Insert a page break here so that your References page always occurs where it should, on a new page.+++++
  • 35. TRENDS IN MY INDUSTRY 4 References (These are examples of APA reference citations. Please refer to UMUC APA examples or other guidance that you find helpful from OWL or your copy of the APA Style Guide.) Biggs, S., & Nadeau, K. (1992, December). Students with Attention Deficit Disorder (ADD). Presented at Chesapeake Psychological Services to members of Nation's Capital Area Disability Support Services Coalition. Retrieved from http://www.adult- add.org/study/student/study_study_tips.htm Booth, R. C. (1998). List of appropriate school-based
  • 36. accommodations and interventions. Highland Park, Ill.: National Attention Deficit Disorder Association. Retrieved from http://www.add.org/content/school/list.htm General information about Attention-Deficit/Hyperactivity Disorder fact sheet number 19 (FS19). (1999, August). The Academy for Educational Development and the Office of Special Education Programs. Retrieved from http://www.adult- add.org/study/teacher/study_teach_tips.htm Hallowell, E. M., & Ratey, J. J. (1994). Driven to distraction: Recognizing and coping with Attention Deficit Disorder from childhood through adulthood. Retrieved from url or doi Latham, P. H. (2000). Attention Deficit Disorder in college faculty and students: Partners in
  • 37. education. National Center for Law and Learning Disabilities. Article retrieved from http://www.adult- add.org/study/student/study_student_college.htm Robertson, A. S. (2000). ADD/ADHD: What does it mean for parents and families when their child is diagnosed with this condition? Retrieved from http://www.adult- add.org/medical/research/research_family.htm https://sites.umuc.edu/library/libhow/apa_examples.cfm http://www.add.org/content/school/list.htm http://www.adult- add.org/study/student/study_student_college.htm Project: Find Top Trends in Your Profession (industry is Cybersecurity) Step 1: Conduct Research to Identify Top Trends (Cyber Security) Step 2: Choose an Issue to Research Further
  • 38. Step 3: Writing your Research Paper In the previous two steps, you performed searches, first to identify industry trends, and then for information about an issue in one of those trends that you consider to be important to your industry. Now, you should be ready to draft your paper. This would be a good time to review organization in writing and paragraphs. You might also review the Effective Writing Center's Online Guide to Writing, a valuable reference to students who seek to improve their writing. Review your tasks. You are to provide a research paper that provides a summary of the three top trends in your industry (with associated NAICS codes). Provide sufficient background for your reader that the trend is clear and supported by resources you have found. Review resources in References and Citations to ensure that you are using "in text" citations to give credit for the ideas of other authors and to build your credibility as a researcher, neither ignoring sources nor quoting excessively. You will develop a paper that accomplishes two objectives: · It will identify the three top trends in your industry and your rationale for your choices based on the resources you found; · It will discuss an issue within one of the trends that you deem important, based on the current state of the industry, and will be supported by your analysis of facts and a well-reasoned conclusion of what it means to the industry.
  • 39. Start with an outline and flesh out the main themes with supporting statements. This will become your road map to an organized paper. Draft, sleep on it, and edit. Repeat. Your paper will be 5-7 pages, not including your cover page and References page(s), double-spaced, and set up in APA standards. It does not require an abstract. Your citations, both "in text" and in References, will be in accordance with the APA Style Manual Sixth Edition. You may also find this sample APA paper helpful. Your headings will follow this general pattern: · Paper Title (First level position, not bold) · Findings (First level heading, centered, bold) Top Trends of the _____ Industry (Second level heading, bold, flush left) An important emerging issue in a trend (and what it means in context to the industry) (Second level heading, bold, flush left) · Conclusions (First level heading, centered, bold) · References (New page, first level position, not bold) a. cover sheet in good APA format; b. "template" for your paper that includes the headings; your opening paragraph that will introduce the industry, the top trends, the issue that you have chosen, and the question that you pose to answer; and, your draft References page. Use the APA style guide or APA examples to draft your
  • 40. complete citations. Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work. · 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. · 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation. · 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas. · 1.4: Tailor communications to the audience. · 1.5: Use sentence structure appropriate to the task, message and audience. · 2.1: Identify and clearly explain the issue, question, or problem under critical consideration. · 2.2: Locate and access sufficient information to investigate the issue or problem. · 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem. · 2.4: Consider and analyze information in context to the issue