Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

1.section1: Research Paper( Subject name: Emerging Threats and Countermeasures) Topic Selection: The research paper assignment, you will complete the groundwork of gathering required information and i

1.section1:

Research Paper( Subject name: Emerging Threats and Countermeasures)

Topic Selection: The research paper assignment, you will complete the groundwork of gathering required information and ideas to move forward with a draft for submission. The goal is to complete Chapter 1 sections:

- Introduction

- Topic Overview/Background

- Problem Statement

- Purpose Statement

- Hypotheses/Propositions

- Theoretical Perspectives/Conceptual Framework

2.section2

Transfer any content from the previous draft First section of Chapter1.  Complete the remaining sections of Chapter 1. 

Project: Complete the remaining sections of Chapter 1:

- Assumptions/Biases

- Significance of the Study

- Delimitations

- Limitations

- Definitions of Terms

- General Overview of the Research design

- Summary of Chapter One

- Organization of Dissertation (Proposal)

Show more
  • @
  • 954 orders completed
ANSWER

Tutor has posted answer for $35.00. See answer's preview

$35.00

******** ******* *** *************** ** ******* Cyber ******** LandscapeChapter ** ********** ******** *** **************************** of *********** communication technology ***** has **** more **** one can ******* ** ******** ****** ***** *** resulted ** **** threats *** exposures ** ******** *********** ******* ******** 2018) *** ********* are *** ****** of security ************* ******** ************** ** ** employee opting to be *********** *** path ** ***** *** ******** remuneration ***** * masked *********** (Auray & ******** ***** ***** ******** are still ** use **** ***** to be **** ** *** modes ** ***** numerous core **** ******** occur **** ** the ******** hackers *** the above ******** ** come ** **** ********* ********* ********** ** ********** *** pros *** **** of **** ******** is ** ****** ******** ******* ********* *** *** entire ***** ** better ********** ******* *** be ** control ** ***** *************** of *** ****** information ******* **** **** **** to share **** ***** ** not There *** ***** ** this research ***** **** ************* and disclosure is ********* while ********** ******* ************* ***** Nepal ***** Even ****** ***** are **** ** ************ concerning **** ******* **** ********** philosophies are ***** ***** ** ****** of ******* ******* of information breaches ******* ** ******** as **** ** external human ******* * ****** order theory ** Durkheim (1951) ** ***** existing *** a ***** ********* ** ********** what ***** factors *** ** ** *** systems in ***** of ******* ******** claimed **** ******** *** ****** transformations lead to *** ************ ** immediate ***** *** ***** which **** individuals **** ********* ****** ******** ***** people *** *********** methods such ** ********* software ** get what **** want; ** **** **** ** can be ********* ********* economic ****** ** *********** ** *** **** *** **** leads to ********** ******** *** many ******* **** as ******** threats ******** **** ******** threats **** ******* **** ********** *** *********** ***** threats *** ***** ****** due ** **** ** *********** by ******** leaders ** *** ****** ** ************** ***** ** well ** ******* ***** ** ***** ************* **** ******** is designed ** ****** ************ ******** which ******** ******* could *** to ***** **** *** ***** data ******* ********* from ******** ********** conducts *** purpose ** this ******** *** ** ***** ******** ******* ** **** ***** ****** ** with plans ***** ***** ******* *********** ********* **** cyber threats through ************* on the ********** ******** ***** ****** *** **** ** **** breaches **** ****** *** *** *************** **** ***** ****** ******* **** internal staffs ******** ******* *********** is a ******* ******* since * ****** data ****** *** ****** **** individuals *** threaten *** progress ** *** ***** ****************** The *********** ** ********** *********** technology **** ** *** crucial reason *** ************* *** ******** ************ in *** ******* nations ********** ** *** transformed how business is **** *** *** also allowed customers *********** *** ********** to ** ***** ****** and selling online ******* *** commercial industry ********* governments ***** ***** ***** and ****** ****** their **** over *** Internet *********** ** **** ** businesses *** ********** **** their consumers virtually and *************** *** network ************** **** ************* ********** of electronic ************* frameworks has ******** ******** ****** ****** *** *** ******* *** ****** ** **** ******** ******** **** *********** ************* ********* has **** brought **** ***** ************* Threats **** ********* **** ***** ******* *** ********** attacks **** ******* **** ****** *** their ***** rights ** ******* *********** ** *** **** proficient ***** ***** ********** are **** ** ********* **** an ****** ******** ****** (Forrester ***** *** *********** *** cyber-crimes *** advanced ****** ** ******* ********** **** firms ****** ** the ********** ** ******** ******** **** ******* to ****** ***** ********** traffic ** ****** *** threats **** when ** ** logical *** ******** ******* ** *** effectiveness *** ****** recognition ** ***** ******* ******** security policies ********** ** intrusion and ********* *** ******* ********** **** **** ********* *** ***** On the ***** **** ** is * critical **** *** **** because ** ******** ********** *** computing *********** ******* design and hacker ************ ** avoiding ***** ******* *** ********* access (Adebayo 2012) In ********** ********* ***** ** **** *** firm’s trust *** ******** benefit or ****** reason ** ******* *** company’s **** ** * person *** ** *** working *** the **** **** ***** ********* threats advance ****** since *** ************* ****** *** level of ******** threat ** ******** exposure **** ****** **** ********* ******* ** ******** ***** ******** ******* ** the ********** ** **** ** ******** data systems ******* has *** beginning ** politics ** ** *** ********** ** easy ***** ******** ** ********* ********** *** ********* ***** ************* the ******* of ***** deeds ** *** development ** ************* data ********** could help ** ********** *********** classifications to ******* data ******** *** ******* **** Growth ** breaching *** ***** error ********** *********** accessibility privacy and ******** ***** are ******** ******** to **** of ***** and *********** ***** breaches on data ** ********* *** *********** ** ************ ********* For **** ****** **** ******** from human ************ *** ******* ** ********* * business's ability to **** ** ****** levels of ****** control ** *** ******** data ******* to * **** of ****** trust *** ******* *********** ** *** ***** ****** know *** ******* ** **** ******** *** ***** **** ** ******* in ********** cyber-crimes **** touch ***** ***************** *** ******* ** ** addressed in the proposed study is *** internal ***** ******* ******* ** **** ******** **** critically affect **** ********** This ****** was *** will be ** *** ******** ******* ***** ****** the *********** ****** ** ***** ************* ******* internal ***** ******* **** ***** to **** ******** *** ***** ****** threats ** cyber-security ************ ****** & ******** ***** Numerous studies as **** as ******** consultants ******** that prosperous ************ *** *** ** **** ****** ************* ******* *** ** attain ***** ** *********** ******* **** ** *** financial ************ such ** ***** continue ********* the ******* of **** ******** over ***** ******* social ********** *** ******** Institute ** Standards and ********** ***** ***** ********* * ********** ****** ** security and **** management ** information *** ** growing ************ *** ********* **** ********* security ******* ** vital ** *** ******** ** *********** ** the ************** The ******* of the ******** ****** ***** ** ** ******* *** *********** issue **** a ********* on *** ** ******* **** ******** **** cyber-crimes ** *********** the ******** bases ******* **** ***** ** ****** **** inadequate *********** ******* ******** regulator bringing ***** ********* ********* unrecognized ******** *** *** ******* ******** ** ******* *** ************* **** *** viewpoint ** ******** **** *** ******* governments have ***** **** key ** duties ** *** ****** ********** ** well ** ******* IT deals ** *** ****** ******* the *********** ****** ***** ** ********* African ***** *********** **** *** leading managers *** not look **** **** know ********** ***** international contractors Moreover it appeared as if *** *********** did *** **** *** ****** ideas ***** ***** IT ***** ****** be maintained ******** The ****** *** my ***** ** **** ************ **** from **** ******** *** ******** ******* * ******** *** ************** dares **** African businesses **** and what ******** ******* *** ** to ******** *** ***** ****** that ***** ** ******** **** ******** ********* * used a *********** research *********** involving * ****** consisting ** ** ******************* ** *** *** **** any ********** in this ***** ******* of the use ** *********** ***** ******* to ********** better the ******** ***** behaviours *********** for data ******** *** ** ******* measures that ******** ***** use ** prevent ********* ******** *************** ********* Information ** **** ** most ***** are ******* ** ************ **** corner ** ****** *** ***** ******* ** *** ********* ** network ************* Cyber-threats use **** ******* ** *** illicit *********** ** **** of the ******** ************** * ******** two simple tactics ** ******** an ****** chart namely *** state-based ****** *********** by ****** ** ** ****** *** *** host-based ** Ammann ** ** (2005) ** the ***** **** **** ***** ************* **** **** **** ******** *** ******* ********** ******** ** **** ** ****** ***** and ** *********** *** **** of * hacker In this ****** to ******* *** reachability of an attack ***** ** ** ********* ** ****** *** ports It *** in * ****** **** ** ********* ********* *** ** *** ************ **** all ********** on *** hosts ** * ****** In this *** the *********** methodology ***** **** at * **** ******** level ******* the ********* ******* ***** *** to ** ******** *** ********** in any event for ** ********** **** ****** (Sheyner ** ** *************** *** ******* ********** ** **** ******** *** that ********* **** an ****** on ******* ****** *** ****** ** *** firm *** *** way **** ***** affect **** and **** ********** ********** ***** ****** are the ******** link ** ******** ** relations of **** ******** executives ***** ** **** * ********* ** **** with ******** ***** factors successfully ** ******** ************* ********** ****** *** is **** *** planned ************* ****** an ************ ** ************ **** * ********* ********* ********* ******* ********** ****** ** ******** CIO *** *********** ******* experts *** ****** ** ******* ** the survey *** *** interview questions ** ************ ** ********** the ******** questionsSignificance of the ***** This ***** ** ******** because **** folks have *** ***** *********** *********** ***** *** ** the entire ***** *** ** ***** to ** worsening ******** **** ******** ** businesses ***** stop ******** information ***** * person from ***** ******* *** ** ********** ******** ** **** ***** ****** to ***** ***** **** ***** ***** **** *** gap ** ********* the ************ of *** issue of ******** **** breaches *** the ***** ****** **** *********** *************** ******* ** ******* *** *********** of ****** *** impacts ** **** ******** could help ***** Coast ***************** by ********** ******** and ******* **** internal human error ** **** ** factors to ****** ************************* This ******** has *** ***** ***** ******* empirical and *********** ***** *** two have ************* **** *** ********* ***** *** ********* **** explains *** information ********** ********** ********* of * medium-size **** ********* *** ******** threat ***** ********** data *** ************* **** ***** **** *** ******** ** ********* ********** bases ***** ******** ***** ******* *** **** *** **** ***** ******** controls **** *** practised ** ******** the ****** **** study ** ******* ** just one **** *** ********* *** will *** **** **** considerations ex-workers ************ ********* or *** ***** inside ***************** There were **** *********** ** *** ******** *** ***** ************* ** *** ******** *** critical ** *** ******* ** the ******** **** ** *** ************ volunteered ******* *** pay **** *** ** until *** ********* ***** of *** study **** ************ ****** gave ********* accounts to ********* ********* ************** *** ****** *** to ***** ****** *** cultural variations ** diminish ***** **** ***** *** ************ **** from *** different ***** *** **** were able to *** *** ********* ******* six ***** *** their participants **** *** *********** ************** ** *************** *** ********* ** ***** ******************** ** Terms Human ****** *** ***** *** ******* in * **** ***** are: ****** ***** ***** tendencies *** **************** ******* 1990)The ***** ******* *** **** ** the *********** ******* ***** *** ********** (Curtis ***** ************** ********** *** term is ** *********** of ******* and ****** ***** and law administration ** ******* *** severe *********** ******** ********** and economic interests ** a ****** ******** ********* breach: *** term ** * security ********** **** critical ********* ** ****** *********** ** ******* ********* ** accidentally to ** ********* *********** (Ayereby ********** *** **** ** the ************ ** threat vulnerability *** ****** ******** 2018)Loss: *** **** ** **** ********** is ***** ***** it ** *** supposed ** be ** when ** ****** be ******* (Ayereby ************* vulnerability: *** term ** ** *********** flaw in * system that ** ******* ** ******* ** a ****** ******* (Ayereby ************ ******** ** *** ******** ****************** ways ** ******* data breaches *** **** ******* of human factors **** though ***** *** ******** technologies ***** ***** ****** data ******* ***** have a *** ** ****** by ********** *** ******** ** **** ******* ** ***** *** ***** staffs **** ***** **** strong ********** ** ******* ********** ********* *** ****** **** *** ***** ****** **** *** ***** *** **** ****** In **** ******** I interviewed 26 participants who *** ***** on *** to **** resolutions to **** **** ******** ********* *** ** ******* ** *** *************** ** Ivory ***** **** ** the ********** **** ******* *** ******** **** ******** *** others were ** ******** human ******* ******** ** ***** **** followed ** *** post *** **** ***** **** ******* ******** and ***** factors *** ******** ** reducing *** ***************** ******** ****** ** ************ **** more international ********** ********* *** *************** Hackers are ********* their ********* *** ******* continue ** **** **** **** **** ****** access to information ** ************* ******** leaders *** ******* ** **** *************** to prevent data ******** ****** ** * result ** human ******* ********** consciousness ***** *** ******* *** consequence ** ******* is ******** and ********* ** ** a ******* ** ******* *** *********** security ** ***** words a *** ** *********** ******** *********** and IT consultants ********* ********** ** ******* **** possessions *** *********** ** * **** successfully ***** ** *** weight ** ******* *********** ******* * we ******* the ************ ** the ***** *** ********** *********** ** *** form of brief ********** *********** ******** Specifically Chapter *** ****** ***** of software ************* hypertext and hypermedia *** *************** methods ******* * ********* ******* ********* uncertainty ** ****** ********* ******* of *********** and *********** ** *********** ****** ** ******* * ** **** ********* *** ******** *********** ****** *** ********* ** well ** *** **** of *** *********** ******* * ******* the ******* of the ***** ***** **** ****** ** presented In ******* * ** ******* ********** *********** *** *********************************** * ****** * Ritchey * ***** Street * (2005 December) * ********** approach ** ******* attack ******** ******** ****** ****** ******** Security Applications ********** ************* ****** ********** * Wijesekera D & ******* S (2002 ********* ******** *********** ******* vulnerability ******** ************* of *** 9th *** ********** ** ******** and ************** *********** ************* N & ******** * ***** ********* *** ******************* paths of ******* ** ** ********* The sociology of * divided ******** ********* des ************************ ** ** 11-12 ** ********** ********************** M * M ****** ********** **** ******** and Human ******* ** ********** ******* ** ************** EcosystemsCurtis * ****** IT Security: *** Human Factors *** **** ********* Than **** Before ********* 16 ****** **** **** https://wwweiresystemscom/human-factors-are-important-to-your-it-security-strategy/#:~:text=Human%20Factors%20in%20Technologyto%20interact%20with%20those%20systemsDurkheim ** ****** ******** * ***** ** sociology ****** ** ****** SimpsonDutta A & ******** * (2011) Management **** ** information ******** ** the ***** ******* California Management Review ***** ***** Doi: ************************ * (2011) Performance management ** education: milestone or ******************** ** ************** 5-9Jang-Jaccard * ***** Nepal * ****** A survey ** ******** ******* in ******************** ** Computer *** ****** ************* *********** ** (2013) ******** *** ******* ******** *** ******* *********** systems *** ************* *** ****** ***** ********* **** **************************************** ****** J ****** ***** ***** ********* ********** ************ * ****** J *** * Lippmann * ***** **** J * ***** May) Automated ********** *** analysis of ****** ****** InProceedings **** **** ********* ** ******** *** Privacy(pp 273-284) **********

Click here to download attached files: Emerging Threats and Countermeasures.edited.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question