The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 339 Weeks Ago, 5 Days Ago |
| Questions Answered: | 19234 |
| Tutorials Posted: | 19224 |
MBA (IT), PHD
Kaplan University
Apr-2009 - Mar-2014
Professor
University of Santo Tomas
Aug-2006 - Present
Research Project 1 Requirements: A Recent E-Commerce Threat
Overview
In this project, you will research a recent threat (discovered within the last 12 months) to the security of an e-commerce operation. You will define and describe the threat including its discovery, history, impact on e-commerce operations, technical features, and risk. Later in the term, in Research Project 2, you will consider and recommend security controls to mitigate the risk involved.
IMPORTANT: Please remember that this threat must be related to e-commerce, which, with very few exceptions, is now a web-based operation.
Project Procedures
Research:Â You are expected to use credible sources upon which to base your report. In cases when the source is necessary, but credibility is not assured, you must address this issue in the text of your paper. You are required to use APA style for both in-text citations and the Reference section at the end of your paper. You can learn more about APA-style references by clicking the APA tutorial link near the bottom of the Syllabus. You must use a minimum of four sources.
Originality:Â Although you will be using outside sources for this project--and using citations to indicate where ideas have come from within the sources--all writing must be in your own words. No direct quotations of outside sources are allowed.
Required Elements
Deliverables:Â The minimum length of the paper--not counting the cover page, table of contents, and references--is four double-spaced pages. The maximum length is six pages. Do not submit papers that have less or more pages than specified here.Â
Grading Rubrics
CategoryPoints%DescriptionPresentation of the threat2525Include a complete history of the threat including how it was identified, what damage it has caused to date, what vulnerabilities it can exploit, and the nature of the source (criminal, commercial, skilled hackers, unskilled hackers, etc.).Technical description2525Explain the technical features of the vulnerabilities exploited and the mechanism by which the threat achieves its goals.Diagram2020Demonstrate the mechanism of the threat.Presentation3030Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors). There is correct attribution and citation using APA style.Total100100A quality paper will meet or exceed all of the above requirements.
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------you----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------.Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m ----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill-----------