SlideShare a Scribd company logo
1 of 17
This aligns with the 1009W used to evaluate your white paper.
The list is not all-inclusive. Learners
must review the rubric. Maximum effort is expected.
Introduction (Introductory Paragraph):
This paragraph should be written logically and introduces the
reader to the paper. The more powerful the
introduction, the more engaging the paper is. An “Exceeds” or
“Far Exceeds”, the writer must state the
problem or call for action. It must hook the reader in an
inviting and dramatic fashion. If used, your call
for action will be written at the end of the introductory
paragraph; it will not be longer than two sentences.
If your introduction is uninspiring and leaves the reader
wondering why they are reading it, it may be
marked as a “Did not Meet Standard” introduction. It may be
used to link to other papers.
Structure/Organization:
Facilitators will evaluate you on how well your paper is
structured and organized. Consideration for “Far
Exceeds” in this area takes into account a strong introduction,
relevant context, a well-defined problem, a
discussion detailing the sources’ points of view, the writer’s
position followed by their supporting
sources, a solution to the problem, and a conclusion.
Additionally, each section must link to other papers
in a logical and meaningful sequence. The context is important
and must be relevant to the topic. Failing
to link the sections will result in a “Did Not Meet Standard”.
The paper should be logically sequenced
and talking points should be clearly identified using APA 7th
Edition Level 1 Headers (bold and centered.
Limit paragraphs to no more than 8 sentences and no less than
3. Avoid long or run-on sentences (25
words or more) as these detract from the overall readability of
your paper.
Position:
Express your position clearly and ensure it is supported by your
references and in-text citations.
Consideration for “Far Exceeds” in this area takes into account
the number and diversity of cited
references (a minimum of five), which clearly support the
argument; also, the proper use of direct
quotations (no more than 3) which additionally support the
argument and help provide an accurate and
contextual summarized point of view.
Sources Point of View to Support Position:
The selected sources point of view is clearly understood,
relevant, and provides strength to the point of
view. Consideration for “Far Exceeds” in this area assesses the
amount of detail provided; the writer
must provide the maximum relevance, clarity, and unarguable
strength.
Sources:
This area takes into account the amount and variety of sources
used. At a minimum, there must be three
sources used.
Solution
:
A solution is not a conclusion. A solution is clear and detailed.
Consideration for “Far Exceeds” in this
area requires the writer to have a solution which reinforces the
introduction and all major parts of the
problem using historical references, and provides evidence that
supports the solution. What is the
solution to this problem? What examples are available where
the problem, or similar problem, was
solved?
Conclusion:
This area restates the writer’s position and sums up the main
points. Consideration for “Far Exceeds” in
this area requires the writer to concisely justify the evidence
and reasoning. It may be used to link to
other papers. New evidence or information will not be
introduced in the conclusion section.
Develops/Collaboration:
Facilitators will assess this through observation via blackboard
forums. Consideration for “Far Exceeds”
in this area takes into account how the sections link to the
overall paper and other sections. Is the link
clear and concise? Does the structure and organization of the
paper clearly demonstrate group
collaboration? Are the sources used different from the other
sections?
Grammar:
Spell check, grammar check, credible sources, and peer reviews
are recommended to minimize the
number of grammatical errors. Do not use contractions or
first/second person unless directly quoting.
Capitalization, fragments, run-ons, misused words, noun
phrases, possessives, plurals, punctuation,
questions, relative clauses, subject-verb agreement, verb
phrases, spelling, and sentence structure will be
used to evaluate this area. Writers must use oxford commas for
this assignment. A “Far Exceeds” paper
must be 100% error-free.
Style:
Writers will use APA 7th Edition. There is no abstract in this
assignment. Only Level 1 Headers will be
used in this paper. This paper will be 12-point, Times New
Roman, and double-spaced throughout.
These other factors will be considered: not applying to direct
quotes, no sentences are to be identified by
Microsoft Word proofing tool as cliché, colloquial ism, jargon,
contraction, fragment, hyphenated,
compound, misused, possessive, plural, punctuation, relative
clause, sentence length, sentence structure,
And but sentences, successive nouns, prepositional phrases,
unclear phrasing, use of first-person, verb
phrases, wordiness, split infinitives. A “Far Exceeds” paper
must be 100% error-free.
Passive Voice:
Avoid passive voice unless directly quoting. A “Far Exceeds”
paper must not have any use of passive
voice.
Directly Quoted Material:
The paper should not be entirely quoted material; however,
paraphrasing and direct quoting are required
to support your assertions. A “Far Exceeds” paper must not
have more than 5% directly quoted material,
it must not exceed more than three direct quotes but should at
least have one.
Additional areas to evaluate which align with the 1009A are:
“Intellect/Critical Thinking and Problem Solving” and
“Achieves/Life Long Learner”.
WEEKLY REFLECTION 2
Each week quotes are listed for you to read and think about.
Reflect on these quotes and think about your learning outcomes
in this course. What did I learn this week? How will my
behavior change? Are there new ideas I can use at work and in
my relationships with significant others? How can I advance
globalization? How will I promote social justice? What can I do
to make this world a better place to live in for others?
"Of THOSE TO WHOM MUCH IS GIVEN, MUCH IS
EXPECTED"
-- Luke 12:48
"Be kind---everyone you meet is fighting a hard battle."
-- PLATO
"If you don 't understand yourself, I don 't know how you can
lead."
-- Kelly Shimansky
Human Resources Executive
"Trying to plan for the future without a sense of the past is like
trying to plant cut flowers."
-- Daniel Boorstin (1914-2004)
Historian
"We 're told every day, "You can 't change the world." But the
world is changing every day. The only question is….who's
doing it? You or somebody else?"
-- J. Michael Straczynski
Screenwriter & television producer
"A positive thinker does not refuse to recognize the negative, he
refuses to dwell on it. Positive thinking is a form of thought
which habitually looks for the best results from the worst
conditions."
-- Norman Vincent Peale (1898-1883)
Cleric and Writer
"If you create an act, you create a habit. If you create a
character, you create a destiny."
-- Andre Maurois (1885-1968)
Novelist & Essayist
"I cannot know what your destiny will be, but one thing I do
know is that the truly happy among you
Will be those who have learned to serve."
-- Albert Schweitzer
Introduction
In the last few weeks, I have learned that leadership is vital in
giving people direction of what they’re supposed to do and how
they are supposed to do it. Leaders have been essential today,
and effective leadership is being treasured in all organizations
to steer growth and responsibility. Great leaders usually guide
and motivate their members to achieve their goals and promote
collaboration in all aspects of life in the process of
understanding leadership (Michael Page, 2019). I have also
learned the importance of understanding others and the power of
knowledge and action.
What I Learned This Week
Through these teachings, I have realized how much power I
have to rule what I do and achieve greater heights of growth and
promote change to the society by empowering others just like
great leaders do. This week’s readings have helped me change
my personal life and my perspective when it comes to
understanding others and leadership power. I have become more
self-aware of my capabilities, and I am working towards
growth. I have also started to believe in myself more and with a
conviction that I can achieve anything that I put my heart into.
For my better half, I have been able to step up more and help
carry most of the family responsibilities, and my partner has
been able to take a break from the constant stressors
experienced.
Amending My Behaviors/Work and Personal Relationship Ideas
After reflecting on my readings, I am motivated to continue
growing and learning the knowledge needed to help motivate
those around me and aid in their growth. By amending my
behaviors and developing a better me, I will be setting the trend
for others around me and, I’ll be the person that my family and
society desire. From the readings and the knowledge acquired, I
can drive change in the current society through globalization
and fighting for social justice.
How I will Advance Globalization and Promote Social Justice
Because of the widespread power of the internet, the world has
become like a village whereby people can interact with ease.
With the help of the internet, I can set up a campaign and invite
others to create awareness on the importance of globalization
and the world public issues that need to be worked on.
Mobilization and awareness usually work better to remind
people of the power they hold regarding making their own
choices (Racioppi, 2021). Social media can also serve as a
platform to teach the essential points learned in this week, such
as knowledge, action self-awareness, effective leadership, and
understanding others.
References
Michael Page, (2019). 8 Must-Have Qualities of an Effective
Leader. Michael Page. Retrieved on February 26, 2021 from
https://www.michaelpage.com/advice/management-
advice/development-and-retention/8-must-have-qualities-
effective-
leader#:~:text=As%20well%20as%20providing%20direction,the
%20following%20traits%20in%20common
Racioppi, J. (2021). The Ability to Lead Others Starts with The
Ability to Know Yourself. Retrieved on February 26, 2021 from
https://jenniferracioppi.com/the-ability-to-lead-others-starts-
with-the-ability-to-know-yourself/
The Complete Leader, (2020). Understanding and Evaluating
Others. The Complete Leader. Retrieved on February 26, 2021
from https://thecompleteleader.org/understanding-evaluating-
others
Cybersecurity threats1
Cybersecurity threats2
Military Cyber-attacks have emerged from stealing personal
information to controlling military equipment. Cyber
intelligence has become an indispensable aspect of military
training to curb the growing dangers of espionage, data leaks,
and denial of service attacks. Military critical infrastructure
networks are not excluded in cyber warfare as well. Exposure of
military strategies, weapons designs, soldier deployment areas,
and missile deployments are of most importance. It is,
therefore, necessary to protect military networks from attacks or
risk exposing such information to the enemies.
Recently North Korean hackers were involved in espionage
attacks targeting more than ten countries (center for strategic
international studies, 2021). In this attack, military spies use
cyber warfare techniques to get intelligence information from
other countries. Although military espionage is critical to obtain
crucial leads that can help in planning and execution of
missions. The data is of great military value as they can get
military doctrine and operations of their perceived enemies.
Espionage is an international computer crime that is punishable
by death or life imprisonment in many countries.
Man in the middle attack (eavesdropping) is another attack that
involves an attacker impersonating a genuine user in a two-way
exchange of information. Attackers usually compromise data
transfer mechanisms by intercepting communication between
two legitimate parties. Packet sniffer applications are used in
insecure military infrastructure to analyze network traffic.
When a genuine user is authenticated to the system, the ‘man in
the middle’ redirects the user's login details to another fake
website that resembles the genuine one. Another approach
attackers use is creating a phony website that unsuspecting
users log in, providing the attacker with the credentials
necessary to access the actual website.
The US military has also faced a denial of service (DoS) attack
in the past. In this attack, the servers are overwhelmed with
requests from client computers which hamper bandwidth and
network resources. This prevents genuine requests from being
processed. The attackers use several devices to flood the servers
and network infrastructure to cause the system to halt by
exhausting the RAM. According to a Radware report
(Cisco,2020), 33 percent of DoS attacks last for sixty minutes,
60 percent in less than 24 hours, and 15 percent can last more
than thirty days. Botnets are commonly used to launch DoS
attacks. In June 2020, China attackers used a DoS attack against
Indian banks and government agencies over a border row in
Galway Valley (center for strategic international studies, 2021).
Malware attack is also widespread in military cyber warfare.
The malware is usually a malicious program designed to exploit
network vulnerability. The attacker packages the virus in a link
or an email attachment that, when clicked it installs itself. Once
installed, the malware is capable of blocking access to other
genuine users of the network. Other malware programs
(spyware) gather data from the system and send it back to the
attackers. In May 2020, Chinese hackers were accused of
stealing Covid-19 vaccine research (center for strategic
international studies, 2021).
Phishing is another cyber-attack that is executed through
communication channels such as emails that are disguised as
genuine mails. A phishing attack intends to steal sensitive data
such as log-in credentials, credit card details, or installing
spyware in the target’s device. Phishers use compelling
messages that evoke emotions, urgency, and fear to invoke the
victims to click the links or download the attachments. In May
2020, Japan's defense docket announced it was probing a well-
coordinated cyber-attack against Mitsubishi Electric that would
have potentially interfered with new missile designs (center for
strategic international studies, 2021).
Structured query language (SQL) injection is also a typical
cyber threat to military infrastructure. In this attack, a
malicious code is injected into the server that uses SQL
database to reveal sensitive information, which in normal
circumstances it would not. The attack involves modifying SQL
codes in web-based applications (Tweneboah, 2017). Poorly
structured SQL statements and weak input validation
mechanism provide a loophole which attackers usually exploit
to gain access to vital server information. SQL injection can be
used to execute various attacks such as authentication bypass,
deletion of data, modifying contents of the database, and
managing remote control.
A drive-by attack is another cyber-attack used by hackers to
spread malware to insecure webpages by inserting malicious
code in HTTP code. Once a user visits the site, it redirects to
the website operated by the hackers. Unlike phishing attack that
installs malware or spyware when a user clicks the malicious
link, the drive-by attack exploits the insecure websites,
browser, or operating system to install malware to the machine.
To prevent this type of attack, users are required to updates
their operating systems, browsers and avoid visiting suspicious
websites.
Social engineering tricks can also be utilized by hackers to get
crucial information that they can use to launch cyber -attacks.
This technique uses human weakness by luring them into a trap
to steal their confidential data. Attackers can use various
approaches to steal sensitive data, such as scareware programs
that users are tricked into installing without fully understanding
what the software does. Additionally, an insider leak also
contributes to cyber-attacks. For instance, if military personnel
intentionally leaks log-in details and passwords to unauthorized
personnel, then the attackers can access sensitive information.
To sum up, protecting Army data is a very delicate task that
requires expertise to anticipate emerging threats in cyberspace.
The consequences of not protecting personal data are very dire
and can lead to legal repercussions, especially in the Army
where we rely on
References
Center for strategic international studies (2021). Significant
cyber- attacks.
Cisco (2021). Common cyber
attacks.https://www.cisco.com/c/en/us/products/security/commo
n-cyberattacks.html
https://www.csis.org/programs/strategic-technologies-
program/significant-cyber-incidents
J.R. Wilson (2019, December 18). Military cybersecurity.
https://www.militaryaerospace.com/trusted-
computing/article/14073852/military-cyber-security-tactical-
network
Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017).
Cybersecurity threats to IoT applications and service domains.
Wireless Personal Communications, 95(1), 169-185.
This aligns with the 1009W used to evaluate your white paper.

More Related Content

Similar to This aligns with the 1009W used to evaluate your white paper.

Promoting the Health of the.docx
Promoting the Health of the.docxPromoting the Health of the.docx
Promoting the Health of the.docxwrite5
 
Current Events in Health Care Administration Leadership and the Fiedler.pdf
Current Events in Health Care Administration Leadership and the Fiedler.pdfCurrent Events in Health Care Administration Leadership and the Fiedler.pdf
Current Events in Health Care Administration Leadership and the Fiedler.pdfsdfghj21
 
Module 1 session 3 what do you bring #1
Module 1 session 3 what do you bring #1Module 1 session 3 what do you bring #1
Module 1 session 3 what do you bring #1John Pisapia
 
Walden Where in the World Is.docx
Walden Where in the World Is.docxWalden Where in the World Is.docx
Walden Where in the World Is.docxwrite22
 
2015 Hamilton College NIght: How To Write Powerful Personal Statements
2015 Hamilton College NIght: How To Write Powerful Personal Statements2015 Hamilton College NIght: How To Write Powerful Personal Statements
2015 Hamilton College NIght: How To Write Powerful Personal StatementsRebecca Joseph
 
and hydration.pdf
and hydration.pdfand hydration.pdf
and hydration.pdfbkbk37
 

Similar to This aligns with the 1009W used to evaluate your white paper. (7)

Promoting the Health of the.docx
Promoting the Health of the.docxPromoting the Health of the.docx
Promoting the Health of the.docx
 
Current Events in Health Care Administration Leadership and the Fiedler.pdf
Current Events in Health Care Administration Leadership and the Fiedler.pdfCurrent Events in Health Care Administration Leadership and the Fiedler.pdf
Current Events in Health Care Administration Leadership and the Fiedler.pdf
 
Module 1 session 3 what do you bring #1
Module 1 session 3 what do you bring #1Module 1 session 3 what do you bring #1
Module 1 session 3 what do you bring #1
 
Literature Review On Employee Engagement
Literature Review On Employee EngagementLiterature Review On Employee Engagement
Literature Review On Employee Engagement
 
Walden Where in the World Is.docx
Walden Where in the World Is.docxWalden Where in the World Is.docx
Walden Where in the World Is.docx
 
2015 Hamilton College NIght: How To Write Powerful Personal Statements
2015 Hamilton College NIght: How To Write Powerful Personal Statements2015 Hamilton College NIght: How To Write Powerful Personal Statements
2015 Hamilton College NIght: How To Write Powerful Personal Statements
 
and hydration.pdf
and hydration.pdfand hydration.pdf
and hydration.pdf
 

More from GrazynaBroyles24

6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx
6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx
6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docxGrazynaBroyles24
 
6 pages which reach all of requiements below hereAn essay inclu.docx
6 pages which reach all of requiements below hereAn essay inclu.docx6 pages which reach all of requiements below hereAn essay inclu.docx
6 pages which reach all of requiements below hereAn essay inclu.docxGrazynaBroyles24
 
54w9Performing Effective Project Monitoring and Risk Management.docx
54w9Performing Effective Project Monitoring and Risk Management.docx54w9Performing Effective Project Monitoring and Risk Management.docx
54w9Performing Effective Project Monitoring and Risk Management.docxGrazynaBroyles24
 
5I need a fiive page paper with title page, reference page in APA fo.docx
5I need a fiive page paper with title page, reference page in APA fo.docx5I need a fiive page paper with title page, reference page in APA fo.docx
5I need a fiive page paper with title page, reference page in APA fo.docxGrazynaBroyles24
 
6 pages paper for International relations class Knowledgeable Econo.docx
6 pages paper for International relations class Knowledgeable Econo.docx6 pages paper for International relations class Knowledgeable Econo.docx
6 pages paper for International relations class Knowledgeable Econo.docxGrazynaBroyles24
 
50 words minimum This weeks audio is very informative but o.docx
50 words minimum This weeks audio is very informative but o.docx50 words minimum This weeks audio is very informative but o.docx
50 words minimum This weeks audio is very informative but o.docxGrazynaBroyles24
 
500 word discussion on the passage to answer question at the botto.docx
500 word discussion on the passage to answer question at the botto.docx500 word discussion on the passage to answer question at the botto.docx
500 word discussion on the passage to answer question at the botto.docxGrazynaBroyles24
 
5. An electric motor accomplishes what task[removed]convert.docx
5. An electric motor accomplishes what task[removed]convert.docx5. An electric motor accomplishes what task[removed]convert.docx
5. An electric motor accomplishes what task[removed]convert.docxGrazynaBroyles24
 
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docxGrazynaBroyles24
 
500 wordsAPA FormatScenarioYou are a probation officer a.docx
500 wordsAPA FormatScenarioYou are a probation officer a.docx500 wordsAPA FormatScenarioYou are a probation officer a.docx
500 wordsAPA FormatScenarioYou are a probation officer a.docxGrazynaBroyles24
 
500 words- no references. Must be original, no plagiarism.docx
500 words- no references. Must be original, no plagiarism.docx500 words- no references. Must be original, no plagiarism.docx
500 words- no references. Must be original, no plagiarism.docxGrazynaBroyles24
 
5.5 - Beginnings of the Space ProgramIn this discussion activi.docx
5.5 - Beginnings of the Space ProgramIn this discussion activi.docx5.5 - Beginnings of the Space ProgramIn this discussion activi.docx
5.5 - Beginnings of the Space ProgramIn this discussion activi.docxGrazynaBroyles24
 
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docxGrazynaBroyles24
 
500 words APA formatHow much impact do managers actually have on a.docx
500 words APA formatHow much impact do managers actually have on a.docx500 words APA formatHow much impact do managers actually have on a.docx
500 words APA formatHow much impact do managers actually have on a.docxGrazynaBroyles24
 
5.2Complete one of the following options for your Week 5 Assignm.docx
5.2Complete one of the following options for your Week 5 Assignm.docx5.2Complete one of the following options for your Week 5 Assignm.docx
5.2Complete one of the following options for your Week 5 Assignm.docxGrazynaBroyles24
 
5.1 DBDisparities exist among racial and ethnic groups with rega.docx
5.1 DBDisparities exist among racial and ethnic groups with rega.docx5.1 DBDisparities exist among racial and ethnic groups with rega.docx
5.1 DBDisparities exist among racial and ethnic groups with rega.docxGrazynaBroyles24
 
5. What are the most common types of computer-based information syst.docx
5. What are the most common types of computer-based information syst.docx5. What are the most common types of computer-based information syst.docx
5. What are the most common types of computer-based information syst.docxGrazynaBroyles24
 
5.2 - Postwar Commercial AviationIn this discussion activity, .docx
5.2 - Postwar Commercial AviationIn this discussion activity, .docx5.2 - Postwar Commercial AviationIn this discussion activity, .docx
5.2 - Postwar Commercial AviationIn this discussion activity, .docxGrazynaBroyles24
 
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docxGrazynaBroyles24
 
5-6 paragraphs Interagency is relatively recent as a term, y.docx
5-6 paragraphs Interagency is relatively recent as a term, y.docx5-6 paragraphs Interagency is relatively recent as a term, y.docx
5-6 paragraphs Interagency is relatively recent as a term, y.docxGrazynaBroyles24
 

More from GrazynaBroyles24 (20)

6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx
6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx
6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx
 
6 pages which reach all of requiements below hereAn essay inclu.docx
6 pages which reach all of requiements below hereAn essay inclu.docx6 pages which reach all of requiements below hereAn essay inclu.docx
6 pages which reach all of requiements below hereAn essay inclu.docx
 
54w9Performing Effective Project Monitoring and Risk Management.docx
54w9Performing Effective Project Monitoring and Risk Management.docx54w9Performing Effective Project Monitoring and Risk Management.docx
54w9Performing Effective Project Monitoring and Risk Management.docx
 
5I need a fiive page paper with title page, reference page in APA fo.docx
5I need a fiive page paper with title page, reference page in APA fo.docx5I need a fiive page paper with title page, reference page in APA fo.docx
5I need a fiive page paper with title page, reference page in APA fo.docx
 
6 pages paper for International relations class Knowledgeable Econo.docx
6 pages paper for International relations class Knowledgeable Econo.docx6 pages paper for International relations class Knowledgeable Econo.docx
6 pages paper for International relations class Knowledgeable Econo.docx
 
50 words minimum This weeks audio is very informative but o.docx
50 words minimum This weeks audio is very informative but o.docx50 words minimum This weeks audio is very informative but o.docx
50 words minimum This weeks audio is very informative but o.docx
 
500 word discussion on the passage to answer question at the botto.docx
500 word discussion on the passage to answer question at the botto.docx500 word discussion on the passage to answer question at the botto.docx
500 word discussion on the passage to answer question at the botto.docx
 
5. An electric motor accomplishes what task[removed]convert.docx
5. An electric motor accomplishes what task[removed]convert.docx5. An electric motor accomplishes what task[removed]convert.docx
5. An electric motor accomplishes what task[removed]convert.docx
 
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx
 
500 wordsAPA FormatScenarioYou are a probation officer a.docx
500 wordsAPA FormatScenarioYou are a probation officer a.docx500 wordsAPA FormatScenarioYou are a probation officer a.docx
500 wordsAPA FormatScenarioYou are a probation officer a.docx
 
500 words- no references. Must be original, no plagiarism.docx
500 words- no references. Must be original, no plagiarism.docx500 words- no references. Must be original, no plagiarism.docx
500 words- no references. Must be original, no plagiarism.docx
 
5.5 - Beginnings of the Space ProgramIn this discussion activi.docx
5.5 - Beginnings of the Space ProgramIn this discussion activi.docx5.5 - Beginnings of the Space ProgramIn this discussion activi.docx
5.5 - Beginnings of the Space ProgramIn this discussion activi.docx
 
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx
 
500 words APA formatHow much impact do managers actually have on a.docx
500 words APA formatHow much impact do managers actually have on a.docx500 words APA formatHow much impact do managers actually have on a.docx
500 words APA formatHow much impact do managers actually have on a.docx
 
5.2Complete one of the following options for your Week 5 Assignm.docx
5.2Complete one of the following options for your Week 5 Assignm.docx5.2Complete one of the following options for your Week 5 Assignm.docx
5.2Complete one of the following options for your Week 5 Assignm.docx
 
5.1 DBDisparities exist among racial and ethnic groups with rega.docx
5.1 DBDisparities exist among racial and ethnic groups with rega.docx5.1 DBDisparities exist among racial and ethnic groups with rega.docx
5.1 DBDisparities exist among racial and ethnic groups with rega.docx
 
5. What are the most common types of computer-based information syst.docx
5. What are the most common types of computer-based information syst.docx5. What are the most common types of computer-based information syst.docx
5. What are the most common types of computer-based information syst.docx
 
5.2 - Postwar Commercial AviationIn this discussion activity, .docx
5.2 - Postwar Commercial AviationIn this discussion activity, .docx5.2 - Postwar Commercial AviationIn this discussion activity, .docx
5.2 - Postwar Commercial AviationIn this discussion activity, .docx
 
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx
 
5-6 paragraphs Interagency is relatively recent as a term, y.docx
5-6 paragraphs Interagency is relatively recent as a term, y.docx5-6 paragraphs Interagency is relatively recent as a term, y.docx
5-6 paragraphs Interagency is relatively recent as a term, y.docx
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

This aligns with the 1009W used to evaluate your white paper.

  • 1. This aligns with the 1009W used to evaluate your white paper. The list is not all-inclusive. Learners must review the rubric. Maximum effort is expected. Introduction (Introductory Paragraph): This paragraph should be written logically and introduces the reader to the paper. The more powerful the introduction, the more engaging the paper is. An “Exceeds” or “Far Exceeds”, the writer must state the problem or call for action. It must hook the reader in an inviting and dramatic fashion. If used, your call for action will be written at the end of the introductory paragraph; it will not be longer than two sentences. If your introduction is uninspiring and leaves the reader wondering why they are reading it, it may be marked as a “Did not Meet Standard” introduction. It may be used to link to other papers. Structure/Organization: Facilitators will evaluate you on how well your paper is structured and organized. Consideration for “Far Exceeds” in this area takes into account a strong introduction, relevant context, a well-defined problem, a discussion detailing the sources’ points of view, the writer’s position followed by their supporting sources, a solution to the problem, and a conclusion. Additionally, each section must link to other papers in a logical and meaningful sequence. The context is important and must be relevant to the topic. Failing to link the sections will result in a “Did Not Meet Standard”.
  • 2. The paper should be logically sequenced and talking points should be clearly identified using APA 7th Edition Level 1 Headers (bold and centered. Limit paragraphs to no more than 8 sentences and no less than 3. Avoid long or run-on sentences (25 words or more) as these detract from the overall readability of your paper. Position: Express your position clearly and ensure it is supported by your references and in-text citations. Consideration for “Far Exceeds” in this area takes into account the number and diversity of cited references (a minimum of five), which clearly support the argument; also, the proper use of direct quotations (no more than 3) which additionally support the argument and help provide an accurate and contextual summarized point of view. Sources Point of View to Support Position: The selected sources point of view is clearly understood, relevant, and provides strength to the point of view. Consideration for “Far Exceeds” in this area assesses the amount of detail provided; the writer must provide the maximum relevance, clarity, and unarguable strength. Sources: This area takes into account the amount and variety of sources used. At a minimum, there must be three sources used.
  • 3. Solution : A solution is not a conclusion. A solution is clear and detailed. Consideration for “Far Exceeds” in this area requires the writer to have a solution which reinforces the introduction and all major parts of the problem using historical references, and provides evidence that supports the solution. What is the solution to this problem? What examples are available where the problem, or similar problem, was solved? Conclusion: This area restates the writer’s position and sums up the main points. Consideration for “Far Exceeds” in this area requires the writer to concisely justify the evidence and reasoning. It may be used to link to other papers. New evidence or information will not be
  • 4. introduced in the conclusion section. Develops/Collaboration: Facilitators will assess this through observation via blackboard forums. Consideration for “Far Exceeds” in this area takes into account how the sections link to the overall paper and other sections. Is the link clear and concise? Does the structure and organization of the paper clearly demonstrate group collaboration? Are the sources used different from the other sections? Grammar: Spell check, grammar check, credible sources, and peer reviews are recommended to minimize the number of grammatical errors. Do not use contractions or first/second person unless directly quoting. Capitalization, fragments, run-ons, misused words, noun phrases, possessives, plurals, punctuation, questions, relative clauses, subject-verb agreement, verb phrases, spelling, and sentence structure will be used to evaluate this area. Writers must use oxford commas for this assignment. A “Far Exceeds” paper
  • 5. must be 100% error-free. Style: Writers will use APA 7th Edition. There is no abstract in this assignment. Only Level 1 Headers will be used in this paper. This paper will be 12-point, Times New Roman, and double-spaced throughout. These other factors will be considered: not applying to direct quotes, no sentences are to be identified by Microsoft Word proofing tool as cliché, colloquial ism, jargon, contraction, fragment, hyphenated, compound, misused, possessive, plural, punctuation, relative clause, sentence length, sentence structure, And but sentences, successive nouns, prepositional phrases, unclear phrasing, use of first-person, verb phrases, wordiness, split infinitives. A “Far Exceeds” paper must be 100% error-free. Passive Voice: Avoid passive voice unless directly quoting. A “Far Exceeds” paper must not have any use of passive voice.
  • 6. Directly Quoted Material: The paper should not be entirely quoted material; however, paraphrasing and direct quoting are required to support your assertions. A “Far Exceeds” paper must not have more than 5% directly quoted material, it must not exceed more than three direct quotes but should at least have one. Additional areas to evaluate which align with the 1009A are: “Intellect/Critical Thinking and Problem Solving” and “Achieves/Life Long Learner”. WEEKLY REFLECTION 2 Each week quotes are listed for you to read and think about. Reflect on these quotes and think about your learning outcomes in this course. What did I learn this week? How will my behavior change? Are there new ideas I can use at work and in my relationships with significant others? How can I advance globalization? How will I promote social justice? What can I do to make this world a better place to live in for others? "Of THOSE TO WHOM MUCH IS GIVEN, MUCH IS
  • 7. EXPECTED" -- Luke 12:48 "Be kind---everyone you meet is fighting a hard battle." -- PLATO "If you don 't understand yourself, I don 't know how you can lead." -- Kelly Shimansky Human Resources Executive "Trying to plan for the future without a sense of the past is like trying to plant cut flowers." -- Daniel Boorstin (1914-2004) Historian "We 're told every day, "You can 't change the world." But the world is changing every day. The only question is….who's doing it? You or somebody else?" -- J. Michael Straczynski Screenwriter & television producer "A positive thinker does not refuse to recognize the negative, he refuses to dwell on it. Positive thinking is a form of thought which habitually looks for the best results from the worst conditions." -- Norman Vincent Peale (1898-1883) Cleric and Writer "If you create an act, you create a habit. If you create a character, you create a destiny."
  • 8. -- Andre Maurois (1885-1968) Novelist & Essayist "I cannot know what your destiny will be, but one thing I do know is that the truly happy among you Will be those who have learned to serve." -- Albert Schweitzer Introduction In the last few weeks, I have learned that leadership is vital in giving people direction of what they’re supposed to do and how they are supposed to do it. Leaders have been essential today, and effective leadership is being treasured in all organizations to steer growth and responsibility. Great leaders usually guide and motivate their members to achieve their goals and promote collaboration in all aspects of life in the process of understanding leadership (Michael Page, 2019). I have also learned the importance of understanding others and the power of knowledge and action. What I Learned This Week Through these teachings, I have realized how much power I have to rule what I do and achieve greater heights of growth and promote change to the society by empowering others just like great leaders do. This week’s readings have helped me change
  • 9. my personal life and my perspective when it comes to understanding others and leadership power. I have become more self-aware of my capabilities, and I am working towards growth. I have also started to believe in myself more and with a conviction that I can achieve anything that I put my heart into. For my better half, I have been able to step up more and help carry most of the family responsibilities, and my partner has been able to take a break from the constant stressors experienced. Amending My Behaviors/Work and Personal Relationship Ideas After reflecting on my readings, I am motivated to continue growing and learning the knowledge needed to help motivate those around me and aid in their growth. By amending my behaviors and developing a better me, I will be setting the trend for others around me and, I’ll be the person that my family and society desire. From the readings and the knowledge acquired, I can drive change in the current society through globalization and fighting for social justice. How I will Advance Globalization and Promote Social Justice Because of the widespread power of the internet, the world has become like a village whereby people can interact with ease. With the help of the internet, I can set up a campaign and invite others to create awareness on the importance of globalization and the world public issues that need to be worked on. Mobilization and awareness usually work better to remind
  • 10. people of the power they hold regarding making their own choices (Racioppi, 2021). Social media can also serve as a platform to teach the essential points learned in this week, such as knowledge, action self-awareness, effective leadership, and understanding others. References Michael Page, (2019). 8 Must-Have Qualities of an Effective Leader. Michael Page. Retrieved on February 26, 2021 from https://www.michaelpage.com/advice/management- advice/development-and-retention/8-must-have-qualities-
  • 11. effective- leader#:~:text=As%20well%20as%20providing%20direction,the %20following%20traits%20in%20common Racioppi, J. (2021). The Ability to Lead Others Starts with The Ability to Know Yourself. Retrieved on February 26, 2021 from https://jenniferracioppi.com/the-ability-to-lead-others-starts- with-the-ability-to-know-yourself/ The Complete Leader, (2020). Understanding and Evaluating Others. The Complete Leader. Retrieved on February 26, 2021 from https://thecompleteleader.org/understanding-evaluating- others Cybersecurity threats1 Cybersecurity threats2
  • 12. Military Cyber-attacks have emerged from stealing personal information to controlling military equipment. Cyber intelligence has become an indispensable aspect of military training to curb the growing dangers of espionage, data leaks, and denial of service attacks. Military critical infrastructure networks are not excluded in cyber warfare as well. Exposure of military strategies, weapons designs, soldier deployment areas, and missile deployments are of most importance. It is, therefore, necessary to protect military networks from attacks or risk exposing such information to the enemies. Recently North Korean hackers were involved in espionage attacks targeting more than ten countries (center for strategic international studies, 2021). In this attack, military spies use cyber warfare techniques to get intelligence information from other countries. Although military espionage is critical to obtain crucial leads that can help in planning and execution of missions. The data is of great military value as they can get military doctrine and operations of their perceived enemies. Espionage is an international computer crime that is punishable by death or life imprisonment in many countries. Man in the middle attack (eavesdropping) is another attack that involves an attacker impersonating a genuine user in a two-way exchange of information. Attackers usually compromise data
  • 13. transfer mechanisms by intercepting communication between two legitimate parties. Packet sniffer applications are used in insecure military infrastructure to analyze network traffic. When a genuine user is authenticated to the system, the ‘man in the middle’ redirects the user's login details to another fake website that resembles the genuine one. Another approach attackers use is creating a phony website that unsuspecting users log in, providing the attacker with the credentials necessary to access the actual website. The US military has also faced a denial of service (DoS) attack in the past. In this attack, the servers are overwhelmed with requests from client computers which hamper bandwidth and network resources. This prevents genuine requests from being processed. The attackers use several devices to flood the servers and network infrastructure to cause the system to halt by exhausting the RAM. According to a Radware report (Cisco,2020), 33 percent of DoS attacks last for sixty minutes, 60 percent in less than 24 hours, and 15 percent can last more than thirty days. Botnets are commonly used to launch DoS attacks. In June 2020, China attackers used a DoS attack against Indian banks and government agencies over a border row in Galway Valley (center for strategic international studies, 2021). Malware attack is also widespread in military cyber warfare. The malware is usually a malicious program designed to exploit network vulnerability. The attacker packages the virus in a link
  • 14. or an email attachment that, when clicked it installs itself. Once installed, the malware is capable of blocking access to other genuine users of the network. Other malware programs (spyware) gather data from the system and send it back to the attackers. In May 2020, Chinese hackers were accused of stealing Covid-19 vaccine research (center for strategic international studies, 2021). Phishing is another cyber-attack that is executed through communication channels such as emails that are disguised as genuine mails. A phishing attack intends to steal sensitive data such as log-in credentials, credit card details, or installing spyware in the target’s device. Phishers use compelling messages that evoke emotions, urgency, and fear to invoke the victims to click the links or download the attachments. In May 2020, Japan's defense docket announced it was probing a well- coordinated cyber-attack against Mitsubishi Electric that would have potentially interfered with new missile designs (center for strategic international studies, 2021). Structured query language (SQL) injection is also a typical cyber threat to military infrastructure. In this attack, a malicious code is injected into the server that uses SQL database to reveal sensitive information, which in normal circumstances it would not. The attack involves modifying SQL codes in web-based applications (Tweneboah, 2017). Poorly structured SQL statements and weak input validation
  • 15. mechanism provide a loophole which attackers usually exploit to gain access to vital server information. SQL injection can be used to execute various attacks such as authentication bypass, deletion of data, modifying contents of the database, and managing remote control. A drive-by attack is another cyber-attack used by hackers to spread malware to insecure webpages by inserting malicious code in HTTP code. Once a user visits the site, it redirects to the website operated by the hackers. Unlike phishing attack that installs malware or spyware when a user clicks the malicious link, the drive-by attack exploits the insecure websites, browser, or operating system to install malware to the machine. To prevent this type of attack, users are required to updates their operating systems, browsers and avoid visiting suspicious websites. Social engineering tricks can also be utilized by hackers to get crucial information that they can use to launch cyber -attacks. This technique uses human weakness by luring them into a trap to steal their confidential data. Attackers can use various approaches to steal sensitive data, such as scareware programs that users are tricked into installing without fully understanding what the software does. Additionally, an insider leak also contributes to cyber-attacks. For instance, if military personnel intentionally leaks log-in details and passwords to unauthorized personnel, then the attackers can access sensitive information.
  • 16. To sum up, protecting Army data is a very delicate task that requires expertise to anticipate emerging threats in cyberspace. The consequences of not protecting personal data are very dire and can lead to legal repercussions, especially in the Army where we rely on References Center for strategic international studies (2021). Significant cyber- attacks. Cisco (2021). Common cyber attacks.https://www.cisco.com/c/en/us/products/security/commo n-cyberattacks.html https://www.csis.org/programs/strategic-technologies- program/significant-cyber-incidents J.R. Wilson (2019, December 18). Military cybersecurity. https://www.militaryaerospace.com/trusted- computing/article/14073852/military-cyber-security-tactical- network Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cybersecurity threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169-185.