5 sources, short summary for each source, The subject is about “Trust Computing and File System Encryption” and “Operating System security.”
5_summaries_of_the_source.docx

Unformatted Attachment Preview

5 summaries of the source (4 sentences each) – 2pts each
• 2 scholarly articles (scholar.google.com)
• 1-2 magazine – publications
• 1-2 blogs – websites
• Specific to the week’s topic (Trust Computing
and File System Encryption)
• Remember that all sources must be from 2014 or later
• The five summaries must consist of :
• two scholarly articles,
• one-two magazines/publications,
• one-two blogs/websites (no wikipedia or
anything sketchy – if you are asking if or thinking
it is sketchy, it is sketchy).
• The summary should explain the content (1 pt) and the
importance to someone in the cyber security domain (1
pt).
• The summary should emphasize how the article adds to
the community (builds on the pasts) [Additive].
• When selecting and reading the resource, consider
• Why the article is worth someone’s time to read?
• How is the article benefiting the community?
• And What new do (does) the author(s) offer?
Article 1 Title – Author(s) – Year of Publication – Journal Article
URL to article
Brief writeup (4 sentences)
Article 2 Title – Author(s) – Year of Publication – Journal Article
URL to article
Brief writeup (4 sentences)
Article 3 Title – Author(s) – Year of Publication – Article Type
URL to article
Brief writeup (4 sentences)
Article 4 Title – Author(s) – Year of Publication – Article Type
URL to article
Brief writeup (4 sentences)
Article 5 Title – Author(s) – Year of Publication – Article Type
URL to article
Brief writeup (4 sentences)

Purchase answer to see full
attachment