A paper is due in week 7 of the course (a minimum of 2000 words). You are to select a topic (or topics, if it applies) in computer security and find two actual examples of where security has failed because of factors you identify from your text as case studies, which you will then analyze. For instance, you may select a worm attack on the Internet and a case where credit card records have been stolen by outside hackers. Other examples include employee theft of guarded intellectual property, hacker exploitation that has resulted in costly damages to systems, or even email virus attacks.
Explain the background of each case sufficiently that the specific security issues are apparent, analyze what you feel “went wrong” (in terms of what you have learned), and propose future recommendations that will serve to prevent such breaches in future. If experts have published opinions on the cases, present their findings and explain why you agree or disagree with their analyses.
The key to this assignment is to demonstrate your understanding of the topics, not to reword your readings and information you find on the breaches and present empty, boring facts.
The paper will follow a conventional report format (introduction, body, conclusion, references). The paper is to follow the APA style guide, Sixth Edition (available via bookstores). Also refer to APA?s online resources: http://apastyle.apa.org/learn/tutorials/basics-tutorial.aspx
There should be a minimum of 10 peer-reviewed references (for example, there should be no references to blogs or Wikipedia). You will be required to run your paper through Turnitin.com, ensure that your similarity index is sufficiently low, and submit an originality report with your paper.
Your paper will be graded on the following categories:
? Focus/Thesis (5 pts)
? Content/Subject Knowledge (10 pts)
? Organization of Ideas/Format (5 pts)
? Writing Conventions (Grammar and Mechanics) (5 pts)
You are about to upload the paper. If you are sure that the paper is propely written and there are no mistakes, proceed with uploading. In other case, proofread the paper once more and try again.








Jermaine Byrant
Nicole Johnson



