This aligns with the 1009W used to evaluate your white paper. The list is not all-inclusive. Learners
must review the rubric. Maximum effort is expected.
Introduction (Introductory Paragraph):
This paragraph should be written logically and introduces the reader to the paper. The more powerful the
introduction, the more engaging the paper is. An “Exceeds” or “Far Exceeds”, the writer must state the
problem or call for action. It must hook the reader in an inviting and dramatic fashion. If used, your call
for action will be written at the end of the introductory paragraph; it will not be longer than two sentences.
If your introduction is uninspiring and leaves the reader wondering why they are reading it, it may be
marked as a “Did not Meet Standard” introduction. It may be used to link to other papers.
Structure/Organization:
Facilitators will evaluate you on how well your paper is structured and organized. Consideration for “Far
Exceeds” in this area takes into account a strong introduction, relevant context, a well-defined problem, a
discussion detailing the sources’ points of view, the writer’s position followed by their supporting
sources, a solution to the problem, and a conclusion. Additionally, each section must link to other papers
in a logical and meaningful sequence. The context is important and must be relevant to the topic. Failing
to link the sections will result in a “Did Not Meet Standard”. The paper should be logically sequenced
and talking points should be clearly identified using APA 7th Edition Level 1 Headers (bold and centered.
Limit paragraphs to no more than 8 sentences and no less than 3. Avoid long or run-on sentences (25
words or more) as these detract from the overall readability of your paper.
Position:
Express your position clearly and ensure it is supported by your references and in-text citations.
Consideration for “Far Exceeds” in this area takes into account the number and diversity of cited
references (a minimum of five), which clearly support the argument; also, the proper use of direct
quotations (no more than 3) which additionally support the argument and help provide an accurate and
contextual summarized point of view.
Sources Point of View to Support Position:
The selected sources point of view is clearly understood, relevant, and provides strength to the point of
view. Consideration for “Far Exceeds” in this area assesses the amount of detail provided; the writer
must provide the maximum relevance, clarity, and unarguable strength.
Sources:
This area takes into account the amount and variety of sources used. At a minimum, there must be three
sources used.
Solution
:
A solution is not a conclusion. A solution is clear and detailed. Consideration for “Far Exceeds” in this
area requires the writer to have a solution which reinforces the introduction and all major parts of the
problem using historical references, and provides evidence that sup ...
This aligns with the 1009W used to evaluate your white paper.
1. This aligns with the 1009W used to evaluate your white paper.
The list is not all-inclusive. Learners
must review the rubric. Maximum effort is expected.
Introduction (Introductory Paragraph):
This paragraph should be written logically and introduces the
reader to the paper. The more powerful the
introduction, the more engaging the paper is. An “Exceeds” or
“Far Exceeds”, the writer must state the
problem or call for action. It must hook the reader in an
inviting and dramatic fashion. If used, your call
for action will be written at the end of the introductory
paragraph; it will not be longer than two sentences.
If your introduction is uninspiring and leaves the reader
wondering why they are reading it, it may be
marked as a “Did not Meet Standard” introduction. It may be
used to link to other papers.
Structure/Organization:
Facilitators will evaluate you on how well your paper is
structured and organized. Consideration for “Far
Exceeds” in this area takes into account a strong introduction,
relevant context, a well-defined problem, a
discussion detailing the sources’ points of view, the writer’s
position followed by their supporting
sources, a solution to the problem, and a conclusion.
Additionally, each section must link to other papers
in a logical and meaningful sequence. The context is important
and must be relevant to the topic. Failing
to link the sections will result in a “Did Not Meet Standard”.
2. The paper should be logically sequenced
and talking points should be clearly identified using APA 7th
Edition Level 1 Headers (bold and centered.
Limit paragraphs to no more than 8 sentences and no less than
3. Avoid long or run-on sentences (25
words or more) as these detract from the overall readability of
your paper.
Position:
Express your position clearly and ensure it is supported by your
references and in-text citations.
Consideration for “Far Exceeds” in this area takes into account
the number and diversity of cited
references (a minimum of five), which clearly support the
argument; also, the proper use of direct
quotations (no more than 3) which additionally support the
argument and help provide an accurate and
contextual summarized point of view.
Sources Point of View to Support Position:
The selected sources point of view is clearly understood,
relevant, and provides strength to the point of
view. Consideration for “Far Exceeds” in this area assesses the
amount of detail provided; the writer
must provide the maximum relevance, clarity, and unarguable
strength.
Sources:
This area takes into account the amount and variety of sources
used. At a minimum, there must be three
sources used.
3. Solution
:
A solution is not a conclusion. A solution is clear and detailed.
Consideration for “Far Exceeds” in this
area requires the writer to have a solution which reinforces the
introduction and all major parts of the
problem using historical references, and provides evidence that
supports the solution. What is the
solution to this problem? What examples are available where
the problem, or similar problem, was
solved?
Conclusion:
This area restates the writer’s position and sums up the main
points. Consideration for “Far Exceeds” in
this area requires the writer to concisely justify the evidence
and reasoning. It may be used to link to
other papers. New evidence or information will not be
4. introduced in the conclusion section.
Develops/Collaboration:
Facilitators will assess this through observation via blackboard
forums. Consideration for “Far Exceeds”
in this area takes into account how the sections link to the
overall paper and other sections. Is the link
clear and concise? Does the structure and organization of the
paper clearly demonstrate group
collaboration? Are the sources used different from the other
sections?
Grammar:
Spell check, grammar check, credible sources, and peer reviews
are recommended to minimize the
number of grammatical errors. Do not use contractions or
first/second person unless directly quoting.
Capitalization, fragments, run-ons, misused words, noun
phrases, possessives, plurals, punctuation,
questions, relative clauses, subject-verb agreement, verb
phrases, spelling, and sentence structure will be
used to evaluate this area. Writers must use oxford commas for
this assignment. A “Far Exceeds” paper
5. must be 100% error-free.
Style:
Writers will use APA 7th Edition. There is no abstract in this
assignment. Only Level 1 Headers will be
used in this paper. This paper will be 12-point, Times New
Roman, and double-spaced throughout.
These other factors will be considered: not applying to direct
quotes, no sentences are to be identified by
Microsoft Word proofing tool as cliché, colloquial ism, jargon,
contraction, fragment, hyphenated,
compound, misused, possessive, plural, punctuation, relative
clause, sentence length, sentence structure,
And but sentences, successive nouns, prepositional phrases,
unclear phrasing, use of first-person, verb
phrases, wordiness, split infinitives. A “Far Exceeds” paper
must be 100% error-free.
Passive Voice:
Avoid passive voice unless directly quoting. A “Far Exceeds”
paper must not have any use of passive
voice.
6. Directly Quoted Material:
The paper should not be entirely quoted material; however,
paraphrasing and direct quoting are required
to support your assertions. A “Far Exceeds” paper must not
have more than 5% directly quoted material,
it must not exceed more than three direct quotes but should at
least have one.
Additional areas to evaluate which align with the 1009A are:
“Intellect/Critical Thinking and Problem Solving” and
“Achieves/Life Long Learner”.
WEEKLY REFLECTION 2
Each week quotes are listed for you to read and think about.
Reflect on these quotes and think about your learning outcomes
in this course. What did I learn this week? How will my
behavior change? Are there new ideas I can use at work and in
my relationships with significant others? How can I advance
globalization? How will I promote social justice? What can I do
to make this world a better place to live in for others?
"Of THOSE TO WHOM MUCH IS GIVEN, MUCH IS
7. EXPECTED"
-- Luke 12:48
"Be kind---everyone you meet is fighting a hard battle."
-- PLATO
"If you don 't understand yourself, I don 't know how you can
lead."
-- Kelly Shimansky
Human Resources Executive
"Trying to plan for the future without a sense of the past is like
trying to plant cut flowers."
-- Daniel Boorstin (1914-2004)
Historian
"We 're told every day, "You can 't change the world." But the
world is changing every day. The only question is….who's
doing it? You or somebody else?"
-- J. Michael Straczynski
Screenwriter & television producer
"A positive thinker does not refuse to recognize the negative, he
refuses to dwell on it. Positive thinking is a form of thought
which habitually looks for the best results from the worst
conditions."
-- Norman Vincent Peale (1898-1883)
Cleric and Writer
"If you create an act, you create a habit. If you create a
character, you create a destiny."
8. -- Andre Maurois (1885-1968)
Novelist & Essayist
"I cannot know what your destiny will be, but one thing I do
know is that the truly happy among you
Will be those who have learned to serve."
-- Albert Schweitzer
Introduction
In the last few weeks, I have learned that leadership is vital in
giving people direction of what they’re supposed to do and how
they are supposed to do it. Leaders have been essential today,
and effective leadership is being treasured in all organizations
to steer growth and responsibility. Great leaders usually guide
and motivate their members to achieve their goals and promote
collaboration in all aspects of life in the process of
understanding leadership (Michael Page, 2019). I have also
learned the importance of understanding others and the power of
knowledge and action.
What I Learned This Week
Through these teachings, I have realized how much power I
have to rule what I do and achieve greater heights of growth and
promote change to the society by empowering others just like
great leaders do. This week’s readings have helped me change
9. my personal life and my perspective when it comes to
understanding others and leadership power. I have become more
self-aware of my capabilities, and I am working towards
growth. I have also started to believe in myself more and with a
conviction that I can achieve anything that I put my heart into.
For my better half, I have been able to step up more and help
carry most of the family responsibilities, and my partner has
been able to take a break from the constant stressors
experienced.
Amending My Behaviors/Work and Personal Relationship Ideas
After reflecting on my readings, I am motivated to continue
growing and learning the knowledge needed to help motivate
those around me and aid in their growth. By amending my
behaviors and developing a better me, I will be setting the trend
for others around me and, I’ll be the person that my family and
society desire. From the readings and the knowledge acquired, I
can drive change in the current society through globalization
and fighting for social justice.
How I will Advance Globalization and Promote Social Justice
Because of the widespread power of the internet, the world has
become like a village whereby people can interact with ease.
With the help of the internet, I can set up a campaign and invite
others to create awareness on the importance of globalization
and the world public issues that need to be worked on.
Mobilization and awareness usually work better to remind
10. people of the power they hold regarding making their own
choices (Racioppi, 2021). Social media can also serve as a
platform to teach the essential points learned in this week, such
as knowledge, action self-awareness, effective leadership, and
understanding others.
References
Michael Page, (2019). 8 Must-Have Qualities of an Effective
Leader. Michael Page. Retrieved on February 26, 2021 from
https://www.michaelpage.com/advice/management-
advice/development-and-retention/8-must-have-qualities-
11. effective-
leader#:~:text=As%20well%20as%20providing%20direction,the
%20following%20traits%20in%20common
Racioppi, J. (2021). The Ability to Lead Others Starts with The
Ability to Know Yourself. Retrieved on February 26, 2021 from
https://jenniferracioppi.com/the-ability-to-lead-others-starts-
with-the-ability-to-know-yourself/
The Complete Leader, (2020). Understanding and Evaluating
Others. The Complete Leader. Retrieved on February 26, 2021
from https://thecompleteleader.org/understanding-evaluating-
others
Cybersecurity threats1
Cybersecurity threats2
12. Military Cyber-attacks have emerged from stealing personal
information to controlling military equipment. Cyber
intelligence has become an indispensable aspect of military
training to curb the growing dangers of espionage, data leaks,
and denial of service attacks. Military critical infrastructure
networks are not excluded in cyber warfare as well. Exposure of
military strategies, weapons designs, soldier deployment areas,
and missile deployments are of most importance. It is,
therefore, necessary to protect military networks from attacks or
risk exposing such information to the enemies.
Recently North Korean hackers were involved in espionage
attacks targeting more than ten countries (center for strategic
international studies, 2021). In this attack, military spies use
cyber warfare techniques to get intelligence information from
other countries. Although military espionage is critical to obtain
crucial leads that can help in planning and execution of
missions. The data is of great military value as they can get
military doctrine and operations of their perceived enemies.
Espionage is an international computer crime that is punishable
by death or life imprisonment in many countries.
Man in the middle attack (eavesdropping) is another attack that
involves an attacker impersonating a genuine user in a two-way
exchange of information. Attackers usually compromise data
13. transfer mechanisms by intercepting communication between
two legitimate parties. Packet sniffer applications are used in
insecure military infrastructure to analyze network traffic.
When a genuine user is authenticated to the system, the ‘man in
the middle’ redirects the user's login details to another fake
website that resembles the genuine one. Another approach
attackers use is creating a phony website that unsuspecting
users log in, providing the attacker with the credentials
necessary to access the actual website.
The US military has also faced a denial of service (DoS) attack
in the past. In this attack, the servers are overwhelmed with
requests from client computers which hamper bandwidth and
network resources. This prevents genuine requests from being
processed. The attackers use several devices to flood the servers
and network infrastructure to cause the system to halt by
exhausting the RAM. According to a Radware report
(Cisco,2020), 33 percent of DoS attacks last for sixty minutes,
60 percent in less than 24 hours, and 15 percent can last more
than thirty days. Botnets are commonly used to launch DoS
attacks. In June 2020, China attackers used a DoS attack against
Indian banks and government agencies over a border row in
Galway Valley (center for strategic international studies, 2021).
Malware attack is also widespread in military cyber warfare.
The malware is usually a malicious program designed to exploit
network vulnerability. The attacker packages the virus in a link
14. or an email attachment that, when clicked it installs itself. Once
installed, the malware is capable of blocking access to other
genuine users of the network. Other malware programs
(spyware) gather data from the system and send it back to the
attackers. In May 2020, Chinese hackers were accused of
stealing Covid-19 vaccine research (center for strategic
international studies, 2021).
Phishing is another cyber-attack that is executed through
communication channels such as emails that are disguised as
genuine mails. A phishing attack intends to steal sensitive data
such as log-in credentials, credit card details, or installing
spyware in the target’s device. Phishers use compelling
messages that evoke emotions, urgency, and fear to invoke the
victims to click the links or download the attachments. In May
2020, Japan's defense docket announced it was probing a well-
coordinated cyber-attack against Mitsubishi Electric that would
have potentially interfered with new missile designs (center for
strategic international studies, 2021).
Structured query language (SQL) injection is also a typical
cyber threat to military infrastructure. In this attack, a
malicious code is injected into the server that uses SQL
database to reveal sensitive information, which in normal
circumstances it would not. The attack involves modifying SQL
codes in web-based applications (Tweneboah, 2017). Poorly
structured SQL statements and weak input validation
15. mechanism provide a loophole which attackers usually exploit
to gain access to vital server information. SQL injection can be
used to execute various attacks such as authentication bypass,
deletion of data, modifying contents of the database, and
managing remote control.
A drive-by attack is another cyber-attack used by hackers to
spread malware to insecure webpages by inserting malicious
code in HTTP code. Once a user visits the site, it redirects to
the website operated by the hackers. Unlike phishing attack that
installs malware or spyware when a user clicks the malicious
link, the drive-by attack exploits the insecure websites,
browser, or operating system to install malware to the machine.
To prevent this type of attack, users are required to updates
their operating systems, browsers and avoid visiting suspicious
websites.
Social engineering tricks can also be utilized by hackers to get
crucial information that they can use to launch cyber -attacks.
This technique uses human weakness by luring them into a trap
to steal their confidential data. Attackers can use various
approaches to steal sensitive data, such as scareware programs
that users are tricked into installing without fully understanding
what the software does. Additionally, an insider leak also
contributes to cyber-attacks. For instance, if military personnel
intentionally leaks log-in details and passwords to unauthorized
personnel, then the attackers can access sensitive information.
16. To sum up, protecting Army data is a very delicate task that
requires expertise to anticipate emerging threats in cyberspace.
The consequences of not protecting personal data are very dire
and can lead to legal repercussions, especially in the Army
where we rely on
References
Center for strategic international studies (2021). Significant
cyber- attacks.
Cisco (2021). Common cyber
attacks.https://www.cisco.com/c/en/us/products/security/commo
n-cyberattacks.html
https://www.csis.org/programs/strategic-technologies-
program/significant-cyber-incidents
J.R. Wilson (2019, December 18). Military cybersecurity.
https://www.militaryaerospace.com/trusted-
computing/article/14073852/military-cyber-security-tactical-
network
Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017).
Cybersecurity threats to IoT applications and service domains.
Wireless Personal Communications, 95(1), 169-185.