Programming Zero Day Vulnerability Article Analysis Assignment
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
Programming Zero Day Vulnerability Article Analysis Assignment
An important part of being a tech professional is staying current on trends, technology, and news, for your chosen field. This includes new or emerging technologies, legal considerations, security, and trends in business. If you don’t already have multiple sources in your digital-consumption diet for these topics, this assignment aims to remedy that! Ideally, you discover and are knowledgeable about large changes, events, security concerns, and technologies before your Managers/Directors/Executives do.
Picture a scenario where your director sees on CNN that there’s a new zero day for Windows/Cisco/Intel/Juniper/iOS/OSX, or the latest Ransomware that’s leveling entire companies. The director is concerned as your company uses {technology}, and walks to your office to ask what the plan is to address the threat. Which is a better response, “What zero day?” or “We’ve isolated all machines that have that vulnerability and are applying the {vendor} patch/fix as we speak”. Or, since this is a Systems Design and Analysis class, you need to be aware of emergent threats, tech, or legal changes, and best practices to help produce the best systems possible throughout your roles in the SDLC
The same applies to any major legislation, court cases, injunctions, etc. that could affect your business or operations. Imagine the impact that a landmark privacy act that’s on the verge of being signed into law and requires an overhaul by X date for how private data is handled/stored. Being aware and knowledgeable is always preferable to the alternative, and by consistently seeking new information you’ll begin to identify trends, patterns, and become more effective professionals.
requirements:
Find three websites, tech blogs, or academic journals as your sources. Find two articles, posts, or entries from each source. This is a total of six (6!) items you’ll be writing on.
Provide a link to each article from each source in your assignment submission, along with at minimum four sentences for each article/post/entry explaining what the article is about, and any thoughts you have about it. Please enter your submission text in the provided space, not as a separate document.
If you’re having trouble finding inspiration on what to write about after reading your chosen source, ask yourself the following questions:
How does this affect the industry?
Who does this affect?
Is this good, bad or neutral? Why?
What could the potential impact be?
Is this a new issue? Is it ongoing? Why?
If you do not have any go-to tech blogs or sites you currently frequent, try googling “best tech news sites” or “best tech blogs” for an easy starting point.The below is an example of what one of the six article/post write ups would look like:
https://arstechnica.com/information-technology/201…
(Links to an external site.)This article is about a new zero-day attack that exploits Oracle WebLogic server to install ransomware. I think the impact of this is high, because Oracle WebLogic server applications are often installed on high power, large bandwidth servers that are used in high-security cloud environments which makes them high-value targets. Staying aware of new attacks/vulnerabilities the day they come out is important so I can patch my company’s systems before they get attacked/infected and cause damage to the enterprise.
RUBRIC
Excellent Quality
95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support
91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology
58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score
50-85%
40-38 points
More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points
Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points
Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality
0-45%
37-1 points
The background and/or significance are missing. No search history information is provided.
75-1 points
Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points
There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow Programming Zero Day Vulnerability Article Analysis Assignment
Programming Zero Day Vulnerability Article Analysis Assignment