IT 263 Paper Assignment Technology Report Assignment IT 263 and NET 405 You will write a short technology report paper of at least 4 pages, which will constitute 10% of your final course grade. This...

1 answer below »
Follow instructions carefully


IT 263 Paper Assignment Technology Report Assignment IT 263 and NET 405 You will write a short technology report paper of at least 4 pages, which will constitute 10% of your final course grade. This paper will summarize and discuss information from reading several current news articles about network or security topics. Requirements · First, you must find a Main News Article about some networked technology or network security topic discussed in IT 263 / TDC 405 and is of interest to you. This Main News Article must be authored (either in print or on the web) by a news or technology organization employee. It must have a title, author, and publication date. The publication date must be in 2019 or 2020. This Main News Article will determine the central theme for your paper. · Every student must choose their own unique Main News Article. Once you have chosen one, you should reserve your Main News Article on D2L as follows: Go to the IT 263 & TDC 405 D2L website Discussion’s page and look through all postings in the Technology Reports forum to see if anyone else in the class has already reserved this news article. · If anyone else in the class has already posted the title of the same news article, then you must go back and find another. Every student’s Main News Article must be unique. No two students can use the same main news article for their papers. Whoever posts the article first on D2L gets it. · If no one else has claimed your article, then Start a New Thread in the Technology Reports topic where: · Subject = the title of your Main News Article · Message = Author, publication date, and URL of your article. · Find at least four other related articles that you will read to learn more about your topic. These additional sources can be anything outside of the course materials. These can include other students’ Main News Articles if you find them useful. · The paper must include the following: · At the top of the first page, provide a complete citation of your Main News Article, including title, author, date, URL. · Start the paper with a 1-2 paragraph summary, in your own words, of the contents of your Main News Article. Then, explain why this is an important issue. Finally, tell us why you found this article interesting and/or informative. · Then you must refer to at least one specific IT 263 / TDC 405 class session where related information was discussed (or where you expect it to be discussed if it is upcoming). Specify the date of an IT 263 / TDC 405 class session from the syllabus. Discuss how the course material is related to your main article. · Compare and contrast the information you got from the course materials, your main article, and the additional sources you read. · Add in your conclusions. Predict how these technologies may change the Internet, make things better, make things worse, or disappear entirely in the future. · End with a conclusion summarizing what you have learned. · When your paper is complete, you must post it in TWO places on D2L: (a) first, submit your PDF paper document to the Technology Report assignment folder under Submissions, (b) then go back to D2L Discussions and find the posting/thread where you previously announced your Main News Article, click the down-arrow to the right of your thread name and select “Edit Thread.” Now click “Add Attachments” below your thread text, upload your PDF paper document and click Update. This will allow other students in the class to view and read your paper also. Further Details 1) Submitted papers must be in PDF format. Pages must be numbered. Your name must be on the first page. 2) Each paper must contain at least 4 total double-spaced pages of writing. That is, the writing should generally end on the 5th page or later. You are welcome to include figures, graphs, illustrations, etc., in your paper, but these do not count towards the four required writing pages. 3) The paper must include a Reference List on a separate page at the end listing all books, articles, and websites you read. This list must include at least five sources outside the class materials – specifically, your main article and at least four other sources. 4) Each source in the reference list should be numbered and include the complete article title, author name, publication date, and a URL (if it is a website) or page numbers (if it is a book or magazine) so that I can quickly look up the reference and read it myself. Example of a reference: 2. “Hacker ‘handshake’ hole found in common firewalls” by Ellen Messmer, April 2, 2018, at URL http://www.networkworld.com/news/2018/040214-hacker-exploit-firewalls.html 5) To reinforce ideas in your writing, you should include some quotes from your sources with the reference list number indicated with brackets (example: Networks are “the most important business tool today [3]”) or with superscripts (example: Networks are “the most important business tool today” 3). A paper with no quotes at all will lose points. However, on the other hand, I want to see what you have to say, so no more than 20% of the paper content should be direct quotes. 6) I expect all students to read and understand DePaul’s policy on Academic Integrity (http://academicintegrity.depaul.edu/AcademicIntegrityPolicy.pdf). It will be considered plagiarism, and you will automatically fail this assignment and be reported to the Dean of CDM and the Vice President of Academic Affairs if you: · Copy the exact words (even with minor changes) or substantial ideas from any other person, article, book, or website without putting quotes around them and referring to a correct item in your reference list. · Use information from any source not included in the reference list at the end of your paper. I will be submitting the papers you submit to the TurnItIn Plagiarism Prevention system offered by DePaul (http://www.turnitin.com/static/plagiarism.html) to verify their originality. 7) Spell-check your paper. I will deduct points for misspelled words. 8) In addition to the requirements listed above, the following grading criteria will be used for this paper: · The paper must show me that you clearly understand the material. If you include a long quotation or a list of technical specifications, it is not worth much unless you follow up with a paragraph explaining, in your own words, why this is important and pertinent to your topic. · Your paper should add value to the materials you have read. You can add value by combining materials from several sources or explaining information from a different viewpoint than the original author. Just repeating the original material with no additional comment is not worth as much. 9) Examples of possible news organizations (there are many others): · Network World - http://www.networkworld.com/ · Information Week - http://www.informationweek.com/ · SC Magazine - http://www.scmagazineus.com/ · Security Week – http://www.securityweek.com · Info World – http://www.infoworld.com · CNET News, ZDNET, Forbes, Computer World, CNN, Chicago Tribune, etc., etc. IT 263 / NET 405Technology Report Assignment3
Answered 7 days AfterAug 10, 2021

Answer To: IT 263 Paper Assignment Technology Report Assignment IT 263 and NET 405 You will write a short...

Deepti answered on Aug 17 2021
149 Votes
Network Security Risks Stemming from an Increased Mobile Workforce
[1] Network Security Risks Stemming from an Increased Mobile Workforce. Sam Bocetta, Sam. MAY 07, 2020. https://www.networkcomputing.com/network-se
curity/network-security-risks-stemming-increased-mobile-workforce
Summary
The pandemic has forced the millions of workers to work remotely due to lockdowns and financial struggles. This has led to the online community of workers to more security risks than ever. The chosen article discusses the plight of the companies and their workers who are working from home during pandemic. The companies have switched to remote working style which entails numerous security challenges and new threats. The article discusses three ways which make working from home prone to cyberthreats along with a technique to mitigate these areas. These include increased surface area for attack, network security and phishing attacks. First area is that the increasing number of computers being used in small, medium and large businesses have provided large “attack surface area” to attackers. Second, the network security of home is major aspect of consideration. An insecure home network shall give access to the IoT devices of a smart home making them “susceptible to attack”. Third, attackers use virus to accomplish phishing attack. “Fake email” is used as a tool to penetrate into the vulnerable systems from where acquiring sensitive information is easy.
The methods suggested in the article to mitigate these issues are that companies allowing WFH should practice strict access control. In the rush to switch to remote working during pandemic, companies allowed employees to “access all the systems” which led to cyberattacks and ultimately to disaster. Companies should remind staff about the importance of password protection, use of strong passwords and encryption within home networks. “Business critical” processes should be secured through backups. Backups being the crucial and large source of data, should be “locked down”. Companies use “flash storage backups” for remote workers to access data instead of sharing over the network. Another...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here