Sheet1 Self-Evaluation ScoreInstructor Score Introduction Requirement fully met Not Met Introduction briefly describes the content of the paper and points addressed within one complete paragraph of...

1 answer below »
I need 7 pages without including the title or reference pages


Sheet1 Self-Evaluation ScoreInstructor Score IntroductionRequirement fully metNot Met Introduction briefly describes the content of the paper and points addressed within one complete paragraph of sufficient length.Meets All CriteriaSection Missing or does not meet criteria 10 EvolutionRequirement fully metRequirement Partially MetNot Met This section describes the development and evolution of multiple aspects of technology in your field and contains 1 reference from an academic journal Meets All CriteriaPartially meets criteria but includes referencePartially meets criteria but does not include referenceSection Missing or does not meet criteria 4320 TrendsRequirement fully metRequirement Partially MetNot Met Describes current trends in your career field which technology is expected to address or may possibly be used to address and contains 1 reference from an academic journal. Meets All CriteriaPartially meets criteria but includes referencePartially meets criteria but does not include referenceSection Missing or does not meet criteria 4320 IssuesRequirement fully metRequirement Partially MetNot Met Considering the history of the field and current trends, discusses how the field has or will benefit or suffer as a result of technology utilization and contains 1 reference from an academic journal Meets All CriteriaPartially meets criteria but includes referencePartially meets criteria but does not include referenceSection Missing or does not meet criteria 4320 ConcernsRequirement fully metRequirement Partially MetNot Met Discuss how different persons and groups outside of the field may either benefit or be negatively impacted by current trends to include social and ethical implications and contains 1 reference from an academic journal Meets All CriteriaPartially meets criteria but includes referencePartially meets criteria but does not include referenceSection Missing or does not meet criteria 4320 Application and ConclusionRequirement fully metNot Met Suggests how you may develop and/or apply technology in your future career to address these gaps, deficits, negative consequences in the trends and issues Meets All CriteriaSection Missing or does not meet criteria 10 References Requirement fully metNot Met References must be in correct APA format. Refer to OWL Purdue (search online) for proper formatting. Note: If you are using a citation generator, you will still need to double check to ensure they are correctly formatted. Some citation generators still contain format errors.Meets All CriteriaSection Missing or does not meet criteria 20 Score (out of 20 points)0020 CHECKPOINTSReview the following checkpoints below for your benefit. This section is optional but serves to help you ensure your submission is complete. Checking or initialing boxes does not change instructor grading criteria or policies set forth in the syllabus or specific assignment requirements. Before you submit, answer yes or no to the following questions:Yes/No Is your title page included? Is your paper in MS Word format? Did you meet the page requirement? Did you run your spelling and grammar checker? Do you have your rubric completed and are you ready to submit it along with your paper? Is your rubric in MS Excel format? Did you double check all format requirements to include font, spacing, section headers, etc.? I have read each of the following possible point deductions review and am aware of them: First person used outside of application-1per section More than 1 quote per section-1per occurrence Quotes in excess of 20 words-1per occurrence Paragraphs shorter than 4 sentences-1per occurrence Length penalty-10%per page Spelling and grammar penalty-5%for 4 or more Late submission penalty-10%per day Career Application Paper (CAP) Assignment: All papers will be submitted through SafeAssign and checked for plagiarism. Write a 8-10 page paper (the pages DON’T include the title page and reference page) describing the evolution, trends, issues, societal concerns, and application of technology in your intended career field( My intended career field is (Cybersecurity). Download and complete the grading rubric as a self-evaluation of your paper. Submit both through the assignments tab on Blackboard. Remember you can attach multiple files in a single submission. Format: YOU MUST USE THE TEMPLATE. This includes section headers Double spaced 12 pt. Times-New Roman font, standard spacing 1 inch margins APA You must include inline citations in APA format. Each of your references must be included in your reference list. You must include a references page in APA format. Each reference in your list must be contained in an inline citation within the main body of your paper. Do not include running head, table of contents, or abstract. Style: You may only have 1 quote per section of 20 words or fewer. You may only use first person in the application section. Paper should be free of all spelling and grammar errors. Paragraphs shorter than 4 sentences will be considered filler and result in style point deductions. References: You must have at least 1 reference each for the evolution, trends, issues, and societal concerns sections. This is a total of 4 references. You may not duplicate references. Only academic, peer-reviewed journals are allowed as references. If you need help finding these sources, talk to an ODU librarian via face-to-face, online chat, or e-mail. See the ODU library page for information. No other sources will be accepted. Web pages will not be accepted as references.
Answered 1 days AfterMar 18, 2022

Answer To: Sheet1 Self-Evaluation ScoreInstructor Score Introduction Requirement fully met Not Met...

Dr. Saloni answered on Mar 20 2022
122 Votes
Technology and Cybersecurity
Name
CRN:
Put the date and time submitted here
Technology and Cybersecurity
INTRODUCTION
Cybersecurity measures are intended to safeguard networked applications and systems against cyberattacks. Consumers can get their hands on technologies in one of two ways: by finalising and refining the products before they come on the market, or by adopting the popular approach of unleashing them ofte
n and earlier. As organisations take proactive steps to increase cyber security, the frequency of integrated hacking groups is expanding, and their techniques are becoming more audacious. Individuals are endangered when technology takes precedence over data protection (Casarosa, 2022).
There is a worldwide shortage of technology skills, and cyber security competence is specifically rare to pull by, since the position profiles are continually evolving to meet innovations in emerging technology as well as user expectations, along with legislation and laws. This implies that cyber security professionals must subsequently re-educate themselves and develop their strategy to prevent risks that may arise (Kshetri, 2021).
This paper focuses on the evolution, trends, issues, societal concerns, and application of technology in cybersecurity.
EVOLUTION
The development of cybersecurity has paralleled advancements in information technology. As technology advances, so do the aspects of cybercrime that are perpetrated. However, as technology has progressed, so has the potential to perceive and safeguard the populace from cybercrime before it occurs. It made a lot of progress, from basic cryptosystems to complex algorithms, everything for the sake of keeping communication and data safe (Leszczyna, 2018). During the 1960s, security was focused solely on physical aspects and limiting access to individuals who knew a lot about technology. The system had a password and multiple layers of security. Thomas created the first virus, which was inadvertent. In 1988, Morris Worm created one of the most significant turning moments in the history of cybersecurity. The use of internet technology has begun to rapidly expand. Security protocols had become too costly, culminating in the emergence of a new virus (Savaş & Karataş, 2022).
Its goal was to find defects in a network disruption blocking mechanism. In 1990, an increasing number of people became aware of the internet. They began to share their details online. Anti-virus software and firewalls were mass-produced in large quantities, and the researchers created a virtual firewall that has been constructed on the physical system to prevent fire from spreading inside the structure (Savaş & Karataş, 2022).
Antivirus software was developed to reduce the risk of cyber-attacks. In the year 2000, information security progressed as the number of internet users and utilisation expanded significantly, as did the number of viruses. Artificial intelligence and machine learning have now contributed significantly to the evolution of cyber security. Due to technological developments, botnets are now gathering significant information from computers, including addresses, names, financial data, age, online activities, and more (Leszczyna, 2018).
TRENDS
The first generation of artificial intelligence offensive technologies is now on the trend, and information about hackers employing AI is proliferating. Several entities, such as hardware, the cloud, ISPs, software, and the tool supply chain, are becoming increasingly reliant on a centralised underpinning technology and set of common services. A few of the mathematical issues upon which cryptography systems rely would be solved by a reasonably strong and error-resolved quantum computer. However, when utilised maliciously, it has the potential to impact the cryptographic underpinnings of the globe's network technologies, on which the online economy relies (Stewart Ferguson, 2022).
While next-generation identification systems become more widely available, society will become more reliant on their utilisation in essential applications. The high-value identification ecosystem is anticipated to be actively pursued by incredibly advanced threat actors who will take advantage of vulnerabilities in its various components....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here