Using Resources to Promote Critical Thinking

Advanced persistent threat

  1. Recommendations for remediation of the threat
  2. Research the use of network security controls associated to your threat and industry
  3. Do Not use topics network security,VPN,FIREWALL,ETC
  4. 10-12 pages. Double spaced APA style
  5. At least 10 REFERENCES
  6. 5 ATLEASt PEER REVIEWED SCHOLARLYUsing Resources to Promote Critical Thinking

    Critical thinking is an integral part of any educational program

    we encourage and provide applicable resources for the promotion of critical thinking

    In order to properly research and complete course papers, proper resources must be utilized

    Critical Thinking helps us to:

    Understand the links between ideas.

    Determine the importance and relevance of arguments and ideas.

    Recognize, build and appraise arguments.

    Identify inconsistencies and errors in reasoning.

    Approach problems in a consistent and systematic way.

    Reflect on the justification of their own assumptions, beliefs and values.

    Researching Using the Critical Questions

    When using research resources, it is imperative to review the six critical questions and implement that data into your writings.

    Proper Resources for Research

    When asked to completed a research paper for Computer and Information Sciences, you must use scholarly, peer-reviewed articles.

    A peer-reviewed article is one that has “been evaluated by several researchers or subject specialist in the academic community prior to accepting it for publication” and is “also known as scholarly or refereed.”

    Your professor or the UC Librarian team can help you determine whether or not an article is peer-reviewed.

    Proper Resources for Research

    Examples of sites with peer-reviewed resources

    UC Library Site



    Google Scholar

    Examples of sites with unacceptable resources

    PC Magazine


    Ars Technica


    Proper Format is Important

    All papers written for courses within the School for Computer and Information Sciences must follow the American Psychological Association (APA) writing style.

    University Resources

    The UC Library provides a myriad of online resources to assist students with proper research

    Resources referring to Information Security can be found inside the UC Library site

    Research Topic

    Each threat is a major issue in today’s IT world

    Each threat is associated with an industry to narrow your research and make your recommendations relevant

    While all the threats are different, your papers will have similarities

    Research Topic


    Provide a working knowledge of your assigned threat

    Compare and contrast your assigned threat with others

    Deeply research the use of network security controls associated to your threat and industry

    Tie your research back to recommendations for remediation of the threat

    DO NOT

    Get lost and broaden the topic too far

    Disassociate your peer-reviewed scholarly research from the threat

    Plagiarize and copy/paste from sites

    Forget the topics of our course (e.g. network security, VPN, firewall, etc.)

    Research Paper

    10-12 pages

    Double spaced APA style

    At least 10 references

    At least 5 of your references must be scholarly peer-reviewed articles

    Research Paper

    Find and review peer-reviewed scholarly articles concerning the assigned threats, network security, and the associated industry

    Find and review other information that associates with your topic area

    Apply research from articles on chosen topic area to create research paper

    Research Presentation

    Goal is to summarize your research and recommendations

    Must present for at least 25 minutes but no more than 30 minutes

    Your group will be randomly selected for presentation

    All group members need to participate in the presentation

"Get 15% discount on your first 3 orders with us"
Use the following coupon

Order Now