Cyber Security Planning And Mgmt Week Two

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Order a Similar Paper HERE Order a Different Paper HERE

Research Assignment – WK 2Attached Files:  Sample Article Summary Assignment.docx (13.021 KB) Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html
https://www.lifewire.com/learn-how-antivirus-4102748
http://www.sans.org/newsletters/
http://news.cnet.com/security/
https://www.onlinesecurity.com/news–publications-page
http://www.esecurityplanet.com/views
http://netsecurity.about.com/
https://www.techrepublic.com/

Week 2 – DiscussionEach week please link to an instructor facilitated Discussion Board forum. A Discussion Board rubric clearly communicates expectations for participation, please see the NEC Grading Matrix for Discussion Board Postings as an example.
In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?