This is for my friend’s term paper and he has done the proposal and needs you to do the
bibliography first then he needs to complete the term paper regarding his proposal
and the bibliography..
Term Paper: The
term paper will be about a topic of your choice that is related to I.S.
or I.T. A brief, one-page, written proposal explaining this topic must
be submitted for approval not later than 29 January. An annotated bibliography of the references supporting your paper will be submitted electronically by on 19 February.
An annotated bibliography is a list of citations to references (books,
articles, and documents). Each citation is followed by a brief
(usually about 150 words) descriptive and evaluative paragraph [don’t forget to evaluate the applicability of the source to your topic] called
the annotation. The purpose of the annotation is to inform the reader
of the relevance, accuracy, and quality of the sources cited. (Olin and
Uris Libraries, Cornell University, Ithaca NY 14853). The term paper may not be a resubmitted product
from another course. Plan to keep the scope of this paper narrow and
select a topic designed to expand on the information provided in class.
Specifically, do not select material covered in the
textbook. Sources will be less than seven (7) years old. Completed
papers will be in 12-point type, double-spaced, and consist of not less
than six or more than ten pages (excluding illustrations, graphs,
charts, the cover sheet), and a reference list. Papers will be graded
on applicability, content, logic, flow, proper APA style and citations.
annotated_20bibliography.docx

Unformatted Attachment Preview

Tewari, A., Jain, A. K., & Gupta B. B. (2016). Recent survey of various defense mechanisms
against phishing attacks. Online Publisher. Pg. 3-13. Doi:
http://dx.doi.org/10.1080/15536548.2016.1139423
This is a credible resource which is published online by Aakanksha Tewari, A. K. Jain
and B. B. Gupta in 2016. All of them are credible authors from National Institute of
Technology Kurukshetra. This resource will contribute to the introduction of the paper
that how phishing attacks have become one of the most serious threats for Internet users,
organizations, and service providers. In a phishing attack, the attacker tries to deceive
Internet users and steal their personal information either by using spoofed emails or by
using fake websites or both. Numerous approaches have been planned in the literature for
the detection and mitigating phishing attacks; nevertheless, the Internet community is still
looking for a complete solution to protect the Internet from these attacks.
Rader, M. A., Rehman S. M. (2013). Exploring Historical and Emerging Phishing Techniques
and Mitigating the Associated Security Risks. International Journal of Network Security
& Its Applications (IJNSA), Vol.5, No.4
This Journal article is written by Marc A. Rader and Syed M. Rahman in 2013. Rader is a
credible author from Capella University, Minneapolis, MN, USA and Associate Faculty,
Cochise College AZ, USA. Rehman is also a credible Associate Professor of Computer
Science at the University of Hawaii-Hilo, Hawaii, USA and Part-time Faculty at Capella
University, Minneapolis, USA. This resource will help to identify the security risk of the
phishing attacks faced by the businesses and approaches to mitigate security risks.
Organizations are investing seriously in technical controls for their Information
Assurance infrastructure. These technical controls mitigate and reduce the risk of damage
caused by outsider attacks. Most organizations depend on training to mitigate and reduce
the risk of non-technical attacks such as social engineering.
Lord, N. (2017). Phishing Attack Prevention: How to Identify & Avoid Phishing Scams. Digital
Guardian
Nate Lord posted his article on Digital Guardian website which is a credible website. He
mentioned in his article that the companies can take different approaches to identify and
mitigate phishing attacks. Companies can train employees to identify various types of
phishing attacks which are demanding personal information, emails with generic
greetings, emails requesting urgent response, emails with spoofed links. There are
different steps that companies can take to avoid phishing attacks which are educating
employees, introducing security policies companywide, conducting training sessions,
installing antivirus and monitoring their status, installing SPAM filters and Web filters to
block malicious websites, upgradation of systems with the security updates, encryption of
the sensitive information of the company and require encryption for the employees who
are in tele-communication.

Purchase answer to see full
attachment