Great Deal! Get Instant $25 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Sheet1 Self-Evaluation ScoreInstructor Score Introduction Requirement fully met Not Met Introduction briefly describes the content of the paper and points addressed within one complete paragraph of...

1 answer below »

Sheet1
        Self-Evaluation Score    Instructor Score
    Introduction            Requirement fully met            Not Met
    Introduction
iefly describes the content of the paper and points addressed within one complete paragraph of sufficient length.            Meets All Criteria            Section Missing or does not meet criteria
                1            0
    Evolution            Requirement fully met    Requirement Partially Met        Not Met
    This section describes the development and evolution of multiple aspects of technology in your field and contains 1 reference from an academic journal             Meets All Criteria    Partially meets criteria but includes reference    Partially meets criteria but does not include reference    Section Missing or does not meet criteria
                4    3    2    0
    Trends            Requirement fully met    Requirement Partially Met        Not Met
    Describes cu
ent trends in your career field which technology is expected to address or may possibly be used to address and contains 1 reference from an academic journal.             Meets All Criteria    Partially meets criteria but includes reference    Partially meets criteria but does not include reference    Section Missing or does not meet criteria
                4    3    2    0
    Issues            Requirement fully met    Requirement Partially Met        Not Met
    Considering the history of the field and cu
ent trends, discusses how the field has or will benefit or suffer as a result of technology utilization and contains 1 reference from an academic journal             Meets All Criteria    Partially meets criteria but includes reference    Partially meets criteria but does not include reference    Section Missing or does not meet criteria
                4    3    2    0
    Concerns            Requirement fully met    Requirement Partially Met        Not Met
    Discuss how different persons and groups outside of the field may either benefit or be negatively impacted by cu
ent trends to include social and ethical implications and contains 1 reference from an academic journal             Meets All Criteria    Partially meets criteria but includes reference    Partially meets criteria but does not include reference    Section Missing or does not meet criteria
                4    3    2    0
    Application and Conclusion            Requirement fully met            Not Met
    Suggests how you may develop and/or apply technology in your future career to address these gaps, deficits, negative consequences in the trends and issues             Meets All Criteria            Section Missing or does not meet criteria
                1            0
    References             Requirement fully met            Not Met
    References must be in co
ect APA format. Refer to OWL Purdue (search online) for proper formatting. Note: If you are using a citation generator, you will still need to double check to ensure they are co
ectly formatted. Some citation generators still contain format e
ors.            Meets All Criteria            Section Missing or does not meet criteria
                2            0
    Score (out of 20 points)    0    0    20
    CHECKPOINTS    Review the following checkpoints below for your benefit. This section is optional but serves to help you ensure your submission is complete. Checking or initialing boxes does not change instructor grading criteria or policies set forth in the syllabus or specific assignment requirements.
    Before you submit, answer yes or no to the following questions:                        Yes/No
    Is your title page included?
    Is your paper in MS Word format?
    Did you meet the page requirement?
    Did you run your spelling and grammar checker?
    Do you have your ru
ic completed and are you ready to submit it along with your paper?
    Is your ru
ic in MS Excel format?
    Did you double check all format requirements to include font, spacing, section headers, etc.?
    I have read each of the following possible point deductions review and am aware of them:
    First person used outside of application    -1        per section
    More than 1 quote per section    -1        per occu
ence
    Quotes in excess of 20 words    -1        per occu
ence
    Paragraphs shorter than 4 sentences    -1        per occu
ence
    Length penalty    -10%        per page
    Spelling and grammar penalty    -5%        for 4 or more
    Late submission penalty    -10%        per day

Career Application Paper (CAP)
Assignment:
All papers will be submitted through SafeAssign and checked for plagiarism.
Write a 8-10 page paper (the pages DON’T include the title page and reference page) describing the evolution, trends, issues, societal concerns, and application of technology in your intended career field( My intended career field is (Cybersecurity). Download and complete the grading ru
ic as a self-evaluation of your paper. Submit both through the assignments tab on Blackboard. Remember you can attach multiple files in a single submission.
Format:
YOU MUST USE THE TEMPLATE. This includes section headers
Double spaced
12 pt. Times-New Roman font, standard spacing
1 inch margins
APA
You must include inline citations in APA format. Each of your references must be included in your reference list.
You must include a references page in APA format. Each reference in your list must be contained in an inline citation within the main body of your paper.
Do not include running head, table of contents, or abstract.
Style:
You may only have 1 quote per section of 20 words or fewer.
You may only use first person in the application section.
Paper should be free of all spelling and grammar e
ors.
Paragraphs shorter than 4 sentences will be considered filler and result in style point deductions.
References:
You must have at least 1 reference each for the evolution, trends, issues, and societal concerns sections. This is a total of 4 references. You may not duplicate references. Only academic, peer-reviewed journals are allowed as references. If you need help finding these sources, talk to an ODU li
arian via face-to-face, online chat, or e-mail. See the ODU li
ary page for information. No other sources will be accepted. Web pages will not be accepted as references.
Answered 1 days AfterMar 18, 2022

Solution

Dr. Saloni answered on Mar 20 2022
78 Votes
Technology and Cybersecurity
Name
CRN:
Put the date and time submitted here
Technology and Cybersecurity
INTRODUCTION
Cybersecurity measures are intended to safeguard networked applications and systems against cyberattacks. Consumers can get their hands on technologies in one of two ways: by finalising and refining the products before they come on the market, or by adopting the popular approach of unleashing them often and earlier. As organisations take proactive steps to increase cyber security, the frequency of integrated hacking groups is expanding, and their techniques are becoming more audacious. Individuals are endangered when technology takes precedence over data protection (Casarosa, 2022).
There is a worldwide shortage of technology skills, and cyber security competence is specifically rare to pull by, since the position profiles are continually evolving to meet innovations in emerging technology as well as user expectations, along with legislation and laws. This implies that cyber security professionals must subsequently re-educate themselves and develop their strategy to prevent risks that may arise (Kshetri, 2021).
This paper focuses on the evolution, trends, issues, societal concerns, and application of technology in cybersecurity.
EVOLUTION
The development of cybersecurity has paralleled advancements in information technology. As technology advances, so do the aspects of cybercrime that are perpetrated. However, as technology has progressed, so has the potential to perceive and safeguard the populace from cybercrime before it occurs. It made a lot of progress, from basic cryptosystems to complex algorithms, everything for the sake of keeping communication and data safe (Leszczyna, 2018). During the 1960s, security was focused solely on physical aspects and limiting access to individuals who knew a lot about technology. The system had a password and multiple layers of security. Thomas created the first virus, which was inadvertent. In 1988, Mo
is Worm created one of the most significant turning moments in the history of cybersecurity. The use of internet technology has begun to rapidly expand. Security protocols had become too costly, culminating in the emergence of a new virus (Savaş & Karataş, 2022).
Its goal was to find defects in a network disruption blocking mechanism. In 1990, an increasing number of people became aware of the internet. They began to share their details online. Anti-virus software and firewalls were mass-produced in large quantities, and the researchers created a virtual firewall that has been constructed on the physical system to prevent fire from spreading inside the structure (Savaş & Karataş, 2022).
Antivirus software was developed to reduce the risk of cyber-attacks. In the year 2000, information security progressed as the number of internet users and utilisation expanded significantly, as did the number of viruses. Artificial intelligence and machine learning have now contributed significantly to the evolution of cyber security. Due to technological developments, botnets are now gathering significant information from computers, including addresses, names, financial data, age, online activities, and more (Leszczyna, 2018).
TRENDS
The first generation of artificial intelligence offensive technologies is now on the trend, and information about hackers employing AI is proliferating. Several entities, such as hardware, the cloud, ISPs, software, and the tool supply chain, are becoming increasingly reliant on a centralised underpinning technology and set of common services. A few of the mathematical issues upon which cryptography systems rely would be solved by a reasonably strong and e
or-resolved quantum computer. However, when utilised maliciously, it has the potential to impact the cryptographic underpinnings of the globe's network technologies, on which the online economy relies (Stewart Ferguson, 2022).
While next-generation identification systems become more widely available, society will become more reliant on their utilisation in essential applications. The high-value identification ecosystem is anticipated to be actively pursued by incredibly advanced threat actors who will take advantage of vulnerabilities in its various components....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here