Using Resources to Promote Critical Thinking
Advanced persistent threat
- Recommendations for remediation of the threat
- Research the use of network security controls associated to your threat and industry
- Do Not use topics network security,VPN,FIREWALL,ETC
- 10-12 pages. Double spaced APA style
- At least 10 REFERENCES
- 5 ATLEASt PEER REVIEWED SCHOLARLYUsing Resources to Promote Critical Thinking
Critical thinking is an integral part of any educational program
we encourage and provide applicable resources for the promotion of critical thinking
In order to properly research and complete course papers, proper resources must be utilized
Critical Thinking helps us to:
Understand the links between ideas.
Determine the importance and relevance of arguments and ideas.
Recognize, build and appraise arguments.
Identify inconsistencies and errors in reasoning.
Approach problems in a consistent and systematic way.
Reflect on the justification of their own assumptions, beliefs and values.
http://www.skillsyouneed.com/learn/critical-thinking.html
Researching Using the Critical Questions
When using research resources, it is imperative to review the six critical questions and implement that data into your writings.
Proper Resources for Research
When asked to completed a research paper for Computer and Information Sciences, you must use scholarly, peer-reviewed articles.
A peer-reviewed article is one that has “been evaluated by several researchers or subject specialist in the academic community prior to accepting it for publication” and is “also known as scholarly or refereed.”
Your professor or the UC Librarian team can help you determine whether or not an article is peer-reviewed.
Proper Resources for Research
Examples of sites with peer-reviewed resources
UC Library Site
EBSCOhost
JSTOR
Google Scholar
Examples of sites with unacceptable resources
PC Magazine
Cisco
Ars Technica
Reddit
Proper Format is Important
All papers written for courses within the School for Computer and Information Sciences must follow the American Psychological Association (APA) writing style.
University Resources
The UC Library provides a myriad of online resources to assist students with proper research
Resources referring to Information Security can be found inside the UC Library site
www.ucumberlands.edu/library
Research Topic
Each threat is a major issue in today’s IT world
Each threat is associated with an industry to narrow your research and make your recommendations relevant
While all the threats are different, your papers will have similarities
Research Topic
DO
Provide a working knowledge of your assigned threat
Compare and contrast your assigned threat with others
Deeply research the use of network security controls associated to your threat and industry
Tie your research back to recommendations for remediation of the threat
DO NOT
Get lost and broaden the topic too far
Disassociate your peer-reviewed scholarly research from the threat
Plagiarize and copy/paste from sites
Forget the topics of our course (e.g. network security, VPN, firewall, etc.)
Research Paper
10-12 pages
Double spaced APA style
At least 10 references
At least 5 of your references must be scholarly peer-reviewed articles
Research Paper
Find and review peer-reviewed scholarly articles concerning the assigned threats, network security, and the associated industry
Find and review other information that associates with your topic area
Apply research from articles on chosen topic area to create research paper
Research Presentation
Goal is to summarize your research and recommendations
Must present for at least 25 minutes but no more than 30 minutes
Your group will be randomly selected for presentation
All group members need to participate in the presentation