Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Pick a topic( Windows and the Threat Landscape Security in Microsoft Windows OS Access Controls in Microsoft Windows Microsoft Windows Network Security ) relevant to the information any of the
Pick a topic( Windows and the Threat Landscape Security in Microsoft Windows OS Access Controls in Microsoft Windows Microsoft Windows Network Security ) relevant to the information any of the articles presented( https://technet.microsoft.com/en-us/library/dd277411.aspx
- https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/implementing-least-privilege-administrative-models
- http://resources.infosecinstitute.com/identity-management/
- https://www.sans.edu/cyber-research/security-laboratory/article/311
- Windows 10 Threat Landscape - Multiple Contributors, Microsoft.com
- 7 Things to Know about the Changing Security Landscape - Jessica Lyons Hardcastle
- https://technet.microsoft.com/en-us/security/hh535726.aspx).
- The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page):
INTRODUCTION
- State the topic you are attempting to cover
- State the issues involved
- State why we should be concerned with resolving whatever issues are involved
- State how answering the issues will help us
- State the implications and consequences of dealing with or resolving the issues involved
REVIEW OF THE LITERATURE (2 sources minimal, at least 1 needs to be peer-reviewed)Identify who has tried to answer the question before by doing the following:
- Summarize how each of the sources presents and deals with the subject
- Explain how each source presents and deals with its findings or results
- Explain the relevancy of each source to your topic
- State what you learned from each of your sources
- State in what way(s) each source contributes to answering your issues
DISCUSSION
- State your answer to your issue
- State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue
- State what questions about your topic you still have that your sources may not have answered
CONCLUSIONS
- Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)
- State the implications of your conclusions
- State what might be the possible consequences of your conclusions
- State the significance these implications and consequences might have in the information technology / information security realm
DOCUMENTATION
- On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper
- You should have a MINIMUM of three (2) sources for your paper, at least 1 source needs to be peer-reviewed
- Not meeting this minimum requirement of three (2) sources will lead to a lower evaluation of your paper for each missing source
- Use APA format for documenting your sources
-For APA help: Purdue OWL-For more details on journal types, refer to this link: Rutgers Library