Essay revision to meet specific criteria

I need an Essay revised to meet very specific criteria. 

I need it to be more relevant to the Army and support the assertion “That the Army lags behind in Cyber security efforts therefore we need better cybersecurity assets available in order to protect our mission”. I have attached a copy of guidance 

Don't use plagiarized sources. Get Your Custom Essay on
Essay revision to meet specific criteria
Just from $13/Page
Order Essay

why it lags 

examples 

and solutions 

Cybersecuritythreats 1

Cybersecurity threats 2

Military Cyber-attacks have emerged from stealing personal information to controlling military equipment. Cyber intelligence has become an indispensable aspect of military training to curb the growing dangers of espionage, data leaks, and denial of service attacks. Military critical infrastructure networks are not excluded in cyber warfare as well. Exposure of military strategies, weapons designs, soldier deployment areas, and missile deployments are of most importance. It is, therefore, necessary to protect military networks from attacks or risk exposing such information to the enemies.

Recently North Korean hackers were involved in espionage attacks targeting more than ten countries (center for strategic international studies, 2021). In this attack, military spies use cyber warfare techniques to get intelligence information from other countries. Although military espionage is critical to obtain crucial leads that can help in planning and execution of missions. The data is of great military value as they can get military doctrine and operations of their perceived enemies. Espionage is an international computer crime that is punishable by death or life imprisonment in many countries.

Man in the middle attack (eavesdropping) is another attack that involves an attacker impersonating a genuine user in a two-way exchange of information. Attackers usually compromise data transfer mechanisms by intercepting communication between two legitimate parties. Packet sniffer applications are used in insecure military infrastructure to analyze network traffic. When a genuine user is authenticated to the system, the ‘man in the middle’ redirects the user’s login details to another fake website that resembles the genuine one. Another approach attackers use is creating a phony website that unsuspecting users log in, providing the attacker with the credentials necessary to access the actual website.

The US military has also faced a denial of service (DoS) attack in the past. In this attack, the servers are overwhelmed with requests from client computers which hamper bandwidth and network resources. This prevents genuine requests from being processed. The attackers use several devices to flood the servers and network infrastructure to cause the system to halt by exhausting the RAM. According to a Radware report (Cisco,2020), 33 percent of DoS attacks last for sixty minutes, 60 percent in less than 24 hours, and 15 percent can last more than thirty days. Botnets are commonly used to launch DoS attacks. In June 2020, China attackers used a DoS attack against Indian banks and government agencies over a border row in Galway Valley (center for strategic international studies, 2021).

Malware attack is also widespread in military cyber warfare. The malware is usually a malicious program designed to exploit network vulnerability. The attacker packages the virus in a link or an email attachment that, when clicked it installs itself. Once installed, the malware is capable of blocking access to other genuine users of the network. Other malware programs (spyware) gather data from the system and send it back to the attackers. In May 2020, Chinese hackers were accused of stealing Covid-19 vaccine research (center for strategic international studies, 2021).

Phishing is another cyber-attack that is executed through communication channels such as emails that are disguised as genuine mails. A phishing attack intends to steal sensitive data such as log-in credentials, credit card details, or installing spyware in the target’s device. Phishers use compelling messages that evoke emotions, urgency, and fear to invoke the victims to click the links or download the attachments. In May 2020, Japan’s defense docket announced it was probing a well-coordinated cyber-attack against Mitsubishi Electric that would have potentially interfered with new missile designs (center for strategic international studies, 2021).

Structured query language (SQL) injection is also a typical cyber threat to military infrastructure. In this attack, a malicious code is injected into the server that uses SQL database to reveal sensitive information, which in normal circumstances it would not. The attack involves modifying SQL codes in web-based applications (Tweneboah, 2017). Poorly structured SQL statements and weak input validation mechanism provide a loophole which attackers usually exploit to gain access to vital server information. SQL injection can be used to execute various attacks such as authentication bypass, deletion of data, modifying contents of the database, and managing remote control.

A drive-by attack is another cyber-attack used by hackers to spread malware to insecure webpages by inserting malicious code in HTTP code. Once a user visits the site, it redirects to the website operated by the hackers. Unlike phishing attack that installs malware or spyware when a user clicks the malicious link, the drive-by attack exploits the insecure websites, browser, or operating system to install malware to the machine. To prevent this type of attack, users are required to updates their operating systems, browsers and avoid visiting suspicious websites.

Social engineering tricks can also be utilized by hackers to get crucial information that they can use to launch cyber -attacks. This technique uses human weakness by luring them into a trap to steal their confidential data. Attackers can use various approaches to steal sensitive data, such as scareware programs that users are tricked into installing without fully understanding what the software does. Additionally, an insider leak also contributes to cyber-attacks. For instance, if military personnel intentionally leaks log-in details and passwords to unauthorized personnel, then the attackers can access sensitive information.

To sum up, protecting Army data is a very delicate task that requires expertise to anticipate emerging threats in cyberspace. The consequences of not protecting personal data are very dire and can lead to legal repercussions, especially in the Army where we rely on

References

Center for strategic international studies (2021). Significant cyber- attacks.

Cisco (2021). Common cyber attacks.

https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html

https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents

J.R. Wilson (2019, December 18). Military cybersecurity.

https://www.militaryaerospace.com/trusted-computing/article/14073852/military-cyber-security-tactical-network

Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cybersecurity threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169-185.

This aligns with the 1009W used to evaluate your white paper. The list is not all-inclusive. Learners
must review the rubric. Maximum effort is expected.

Introduction (Introductory Paragraph):

This paragraph should be written logically and introduces the reader to the paper. The more powerful the
introduction, the more engaging the paper is. An “Exceeds” or “Far Exceeds”, the writer must state the
problem or call for action. It must hook the reader in an inviting and dramatic fashion. If used, your call
for action will be written at the end of the introductory paragraph; it will not be longer than two sentences.
If your introduction is uninspiring and leaves the reader wondering why they are reading it, it may be
marked as a “Did not Meet Standard” introduction. It may be used to link to other papers.

Structure/Organization:

Facilitators will evaluate you on how well your paper is structured and organized. Consideration for “Far
Exceeds” in this area takes into account a strong introduction, relevant context, a well-defined problem, a
discussion detailing the sources’ points of view, the writer’s position followed by their supporting
sources, a solution to the problem, and a conclusion. Additionally, each section must link to other papers
in a logical and meaningful sequence. The context is important and must be relevant to the topic. Failing
to link the sections will result in a “Did Not Meet Standard”. The paper should be logically sequenced
and talking points should be clearly identified using APA 7th Edition Level 1 Headers (bold and centered.
Limit paragraphs to no more than 8 sentences and no less than 3. Avoid long or run-on sentences (25
words or more) as these detract from the overall readability of your paper.

Position:

Express your position clearly and ensure it is supported by your references and in-text citations.
Consideration for “Far Exceeds” in this area takes into account the number and diversity of cited
references (a minimum of five), which clearly support the argument; also, the proper use of direct
quotations (no more than 3) which additionally support the argument and help provide an accurate and
contextual summarized point of view.

Sources Point of View to Support Position:

The selected sources point of view is clearly understood, relevant, and provides strength to the point of
view. Consideration for “Far Exceeds” in this area assesses the amount of detail provided; the writer
must provide the maximum relevance, clarity, and unarguable strength.

Sources:

This area takes into account the amount and variety of sources used. At a minimum, there must be three
sources used.

Solution:

A solution is not a conclusion. A solution is clear and detailed. Consideration for “Far Exceeds” in this
area requires the writer to have a solution which reinforces the introduction and all major parts of the
problem using historical references, and provides evidence that supports the solution. What is the
solution to this problem? What examples are available where the problem, or similar problem, was
solved?

Conclusion:

This area restates the writer’s position and sums up the main points. Consideration for “Far Exceeds” in
this area requires the writer to concisely justify the evidence and reasoning. It may be used to link to
other papers. New evidence or information will not be introduced in the conclusion section.

Develops/Collaboration:

Facilitators will assess this through observation via blackboard forums. Consideration for “Far Exceeds”
in this area takes into account how the sections link to the overall paper and other sections. Is the link
clear and concise? Does the structure and organization of the paper clearly demonstrate group
collaboration? Are the sources used different from the other sections?

Grammar:

Spell check, grammar check, credible sources, and peer reviews are recommended to minimize the
number of grammatical errors. Do not use contractions or first/second person unless directly quoting.
Capitalization, fragments, run-ons, misused words, noun phrases, possessives, plurals, punctuation,
questions, relative clauses, subject-verb agreement, verb phrases, spelling, and sentence structure will be
used to evaluate this area. Writers must use oxford commas for this assignment. A “Far Exceeds” paper
must be 100% error-free.

Style:

Writers will use APA 7th Edition. There is no abstract in this assignment. Only Level 1 Headers will be
used in this paper. This paper will be 12-point, Times New Roman, and double-spaced throughout.
These other factors will be considered: not applying to direct quotes, no sentences are to be identified by
Microsoft Word proofing tool as cliché, colloquialism, jargon, contraction, fragment, hyphenated,
compound, misused, possessive, plural, punctuation, relative clause, sentence length, sentence structure,
And but sentences, successive nouns, prepositional phrases, unclear phrasing, use of first-person, verb
phrases, wordiness, split infinitives. A “Far Exceeds” paper must be 100% error-free.

Passive Voice:

Avoid passive voice unless directly quoting. A “Far Exceeds” paper must not have any use of passive
voice.

Directly Quoted Material:

The paper should not be entirely quoted material; however, paraphrasing and direct quoting are required
to support your assertions. A “Far Exceeds” paper must not have more than 5% directly quoted material,
it must not exceed more than three direct quotes but should at least have one.

Additional areas to evaluate which align with the 1009A are:

“Intellect/Critical Thinking and Problem Solving” and “Achieves/Life Long Learner”.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy