Student note: The instructions are in the attached file (You have to choose one topic from the list in page 3 and write the essay about the topic you chose) This is a very important assignment please

Security Paper Instructions and Grading Rubric You are to write a research essay on an approved computer security or privacy topic (see page 3 for a list of approved topics). Your essay must include a work cited page for any information that you find from at least three sources (your book can count fo r one source). If you choose to use internet sources, they must be cited correctly. The specifications for the paper are listed below. All essays will be run through a plagiarism checking software. If any portion of your paper is copied directly from a n internet source or copied from another student, I will take action as deemed appropriate according to the Academic Dishonesty portion of your syllabus. • You can submit the paper only once • No late papers will be accepted • The paper must be submitted in a W ord, pdf, or GoogleDoc format Word Document – Written Essay • Length: Must be at least 3 full pages but no more than 6 NOT including the cover page and works cited page (that mean at least 3 pages of written text). • References: You should have at least 3 sources and they need to be referenced according to APA rules. • Title page: Your header will appear on the first page only (cover page) in the upper -left header and contain the words “Running head: TITLE OF YOUR PAPER”. Following pages will only contain th e title of your paper in the upper -left section of the header. The page number should appear in the right section of the header and not appear on the first page. In addition, the title should appear centered horizontally and vertically on the page. The title should be your own unique name for your paper, not just the topic of the essay. Under the title you should have your name and the name of the college. • Font: Times New Roman, 12pt. • Spacing: Double spaced, with no extra spacing between paragraphs • Ma rgins: All margins set to 1” • Works Cited Page: This page should appear on a page of its own at the end of the essay. No separate document or file will be accepted. • No abstract is needed for this paper. The formatting of this paper follows general APA formatting. If you need further information on how to set up a research paper using APA format you can go to: Purdue University Online Writing Lab -General APA Guidelines (opens new window) Grading Rubric: Elements Beginning Developing Exemplary 0 pts 5 pts 10 pts Length Length less than 1 page Length between 1 -3 pages Length is between 4 - 6 pages Title Page 0 pts 3 pts 5 pts Cover page meets none of the requirements Cover page meets some requirements Cover page meets all requirements 0 pts 2 pts 3 pts Title of Paper Title meets none of the requirements Title meets some of the requirements Title meets all of the requirements Font 0 pts 1 pt 2 pts Font meets none of the requirements Font meets some of the requirements Font meets all requirements Spacing 0 pts 2 pts 5 pts Spacing meets none of the requirements Spacing meets some of the requirements Spacing meets all requirements Headers 0 pts 1 pt 3 pts Headers meet none of the requirements Headers meet some of the requirements Headers meet all requirements Margins 0 pts 1 pt 2 pts Margins meet none of the requirements Margins meet some of the requirements Margins meet all requirements Works Cited 0 pts 5 pts 10 pts No works cited 1-2 references and meets some of the requirements 3 or more references and cited properly Content 0 pts 1-19 pts 20 pts Content meets none of the requirements Content meets some requirements or is poorly written Content is well - written and contains meaningful content related to the topic Approved Topics Below is a list of approved topics for your security paper. If you would like to write about another topic on computer security, please email your instructor prior to writing the paper for approval. Unapproved topics will receive a grade of zero (0). 1. Ra nsomware: What is it? Examples and prevention. 2. What security vulnerabilities does Bluetooth technology pose/ 3. How does encryption help computer and network security? 4. Biometric security 5. Describe at least 4 measures that help make passwords more secure, e.g. length, complexity, one -way hash, lockout, frequency of change, pepper, etc. 6. What is two -factor authentication? 7. Tips to making secure financial transactions online and preventing financial fraud 8. Social engineering: what is it? Examples and prevention 9. Safe use of consumer devices such as baby monitors, voice -activated devices, etc. 10. Phishing: What is it? Examples and prevention. 11. How do patches and updates prevent hacking? 12. Review 3 top antivirus software packages 13. Describe the security concept of “layers of defense”. 14. Describe the security concept of “CIA Triad”. 15. Are computer keyboards and webcam vulnerable to computer attacks? If so, how and what can be done to reduce the vulnerability. 16. Describe 3 of the most damaging and widely publicized inciden ts of hacking that resulted in the theft of personal data and/or financial loss. 17. Describe 3 methods to secure your home network. 18. Describe 3 current U.S. laws related to computer security 19. Describe a honeypot or honeynet. 20. Rootkit. What is it? Examples and prevention. 21. Scareware. What is it? Examples and prevention. 22. Describe DoS and DDoS attacks. 23. Describe the role of computer and data backups in security and 3 good methods of completing backups. 24. Describe a data breach and what companies can do to prevent it . 25. White hat and black hat hackers: who are they?