Search Our Essay Database

Style Essays and Research Papers

Instructions for Style College Essay Examples

Title: technology issue in information assurance

Total Pages: 10 Words: 3012 Works Cited: 15 Citation Style: APA Document Type: Essay

Essay Instructions: Style

In all questions, follow the Publication Manual of the American Psychological Association. Graduate student should have a copy. Otherwise, check out www.apastyle.org. In Web Tycho, do the APA tutorial.

References and Bibliography
Cite references in your text by using the author-date method. Examples

Walker (2000) compared reaction times.

In a recent study of reaction time (Walker, 2000).

You will no doubt be using internet references. In the website mentioned above, click on “electronic references” for the correct manner of stating internet sources in your bibliography. In the manual, refer to page 270.

Format
All work must be typed.
Use 1" margins on all sides of the paper (8.5 x 11 or A4)
Use Times New Roman, 12 points.
Use double spacing.
Use appropriate headings and subheadings. (pages 10-11) The first word of each new paragraph should be indented from the margin.
Number each page in the bottom right corner. The cover page should not be numbered.
Use a cover page (title page) for the paper. See page 10. In the center of the page, in this order, double spaced, put:

Your Name

Course Number and Name

Title of the the paper

English Style and Grammar

All of the errors listed below have occurred and continue to occur.

In the discussion on p.37-39, notice that the Manual does not even consider the use of the word “you,” because such an error does not even occur to the author. Do not use the pronoun “you” in your paper! This is a serious breach of style. Example:

“Having your identity attached to your every thought and opinion .. will surely deter open ended and honest discussions about governmental policies.”

Do not use the pronoun “we” in your paper. You are not royalty, nor may you assume that I am helping you or agree with you! Perhaps the following joke will help the point stick in your mind.

The Lone Ranger and Tonto are surrounded by hostile Indians.
The Lone Ranger turns to Tonto and says, “What do we do now, Tonto?”
Tonto replies, “What do you mean by ‘we’, paleface?

The section on grammar (p. 40-61) is well worth reading. Unfortunately, once again the Manual does not even consider errors which are commonplace in student papers. I refer, for example, to sentence fragments, which lack either a subject, or a verb, or sometimes both:

“Not to mention that criminal’s records are also made public.”

“Which applies to the authors of original works of authorship which includes literary, dramatic, musical, artistic, and intellectual works.”

Other common student errors are:

Its vs. it’s
There vs. their vs. they’re
You’re vs. your
Whether vs. weather

Agreement: “Every PC user should install encryption on their PC.” (Should be “his PC” or “his or her PC”

Use of commas:

The boy, and the girl went to the store. (no comma after “boy”)
The boy went to the store, the girl went home. (Wrong)
The boy went to the store; the girl went home. (right)
The boy went to the store and the girl went home. (right)
The boy went to the store, while the girl went home. (right)

The following is both a rhetorical question (bad style) and a run-on sentence:

“My question to you is the FBI considered a friend or an enemy?”

In this regard, refer to this Wikipedia article http://en.wikipedia.org/wiki/Complex_sentence and also the articles on simple and compound sentences. Many students have considerable difficulties with regard to sentence structure. There is no obligation to use compound and complex sentences if one has difficulty in using them correctly.

Finally, the following sentence is taken from a published book! This is clumsy, confusing, and illogical.

“Every company won’t have to have an IDS”.

Write in a neutral, unemotional, and professional manner. Avoid appeals to patriotism, motherhood, or whatever you think everyone agrees with. Avoid rhetorical questions.

Example
For an example of a good, impersonal, professional style, consult the following document:

“Guide to Intrusion Detection and Prevention Systems” Recommendations of the National Institute of Standards and Technology.
http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------








David A. Christie

INFA610
Computer Security, Software Assurance, Hardware Assurance, and Security Management

Title of the MIDTERM paper

INFA 610 First Paper DAVID CHRISTIE 24JAN2011 to 01MAY2011
First Individual Paper: 20%

You will be graded on two short papers of 5-6 pages in good APA style.

The first paper is to be on a technology issue in information assurance.
Format
All work must be typed.
Use 1" margins on all sides of the paper (8.5 x 11 or A4)
Use Times New Roman, 12 points.
Use double spacing.
Use appropriate headings and subheadings. (pages 10-11) The first word of each new paragraph should be indented from the margin.
Number each page in the bottom right corner. The cover page should not be numbered.
Use a cover page (title page) for the paper. See page 10. In the center of the page, in this order, double spaced, put:

Your Name

Course Number and Name

Title of the paper

http://iase.disa.mil/
Information Assurance ??" Info is there in its integral form when needed.
Technology issue ??" talk about the Iranian worm powerplant issue. How it originated, grew, and concluded.
They used different computer systems to … it can be put into your computer and do nothing…. Put in iran power plant it will crash it.

http://www.google.com/search?hl=en&safe=active&rls=com.microsoft%3Aen-us%3AIE-SearchBox&rlz=1I7ADBS_en&q=Internet+security+flaws&aq=f&aqi=g10&aql=&oq=
http://www.sans.org/top-cyber-security-risks/
http://www.cs.berkeley.edu/~daw/papers/endpoint-security.html
http://www.nytimes.com/2008/07/30/business/worldbusiness/30iht-flaw.4.14893974.html
http://www.crn.com/news/security/18808689/experts-list-top-10-internet-security-flaws.htm;jsessionid=4P2bxFIlGfDgCdfzlU7XLQ**.ecappj01


http://resources.metapress.com/pdf-preview.axd?code=w6p14188v172g63p&size=largest

http://www.defensesystems.com/Articles/2010/07/14/Navy-cybersecurity-information-assurance-directive.aspx

http://www.fas.org/sgp/spb/whitepap.html
Read that magazine: The Economist, titled, “Cyberwar Threat from the internet” and see where you can use or get some key information.
http://www.economist.com/node/16478792
What will cyberwar look like? In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes. Computer bugs bring down military e-mail systems; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery.
(Murphy, 2010)

Murphy, M. (2010, July 01). War in the fifth domain. Then Economist, 396(8689), 3.

http://www.economist.com/node/16481504
http://www.economist.com/node/16481504/comments
http://blog.cybersecuritylaw.us/2010/07/the-economist----cyberwar-the-threat-from-the-internet.html
http://www.time.com/time/covers/0,16641,19950821,00.html
http://www.time.com/time/specials/packages/article/0,28804,2037744_2037563_2037736,00.html
http://www.google.com/search?q=Time+magazine%27s+cover+story+on+%22CYBER+WAR%22&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Google Search: http://www.google.com/search?q=The+Economist+The+threat+from+the+internet&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en

Good summary: http://en.wikipedia.org/wiki/Information_assurance
Google Search: http://www.google.com/search?q=Information+Assurance+issues+of+today&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Look in and research via your membership with ACM & Microsoft TechNet and see if you can come up with anything.
Site the Bruce Willis Movie, “Live Good, Die Hard”




INFA 610 First Paper DAVID CHRISTIE 24JAN2011 to 01MAY2011
First Individual Paper: 20%

You will be graded on two short papers of 5-6 pages in good APA style.
The first is to be on a technology issue in information assurance.

http://www.fas.org/sgp/spb/whitepap.html
Read that magazine: The Economist, titled, “Cyberwar Threat from the internet” and see where you can use or get some key information.
http://www.economist.com/node/16478792
What will cyberwar look like? In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes. Computer bugs bring down military e-mail systems; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery.
(Murphy, 2010)

Murphy, M. (2010, July 01). War in the fifth domain. Then Economist, 396(8689), 3.

http://www.economist.com/node/16481504
http://www.economist.com/node/16481504/comments
http://blog.cybersecuritylaw.us/2010/07/the-economist----cyberwar-the-threat-from-the-internet.html
Google Search: http://www.google.com/search?q=The+Economist+The+threat+from+the+internet&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en

Good summary: http://en.wikipedia.org/wiki/Information_assurance
Google Search: http://www.google.com/search?q=Information+Assurance+issues+of+today&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Look in and research via your membership with ACM & Microsoft TechNet and see if you can come up with anything.
Site the Bruce Willis Movie, “Live Good, Die Hard”
FIRE SALE
Myth?
3 step systematic attack on the entire national infrastructure
1. Take out all of the transportation
2. Financial base & telecoms
3. Get rid of all utilities; gas / water / electric / nuclear / pretty much anything that is run by computers (which today is almost everything).
4. That’s why they call it a File Sale because everything must go
If you take out any one (x1) thing the system can recover, however, if you take it all down the system crashes.
“You write one little piece of code and the world falls apart.”
Virtual terrorism
Eastern Power Grid
Middleton, WV
http://www.imdb.com/title/tt0337978/goofs
http://www.filmsite.org/series-diehard4.html
http://www.nationalgrid.com/

Excerpt From Essay:

Title: Public administration

Total Pages: 5 Words: 1871 Bibliography: 6 Citation Style: None Document Type: Research Paper

Essay Instructions: Style: APA

1. Choose a topic (NOT HEALTHCARE) in history and examine the political, economic, and social contexts of its time. Make a comparison to its current economic, social, and political contexts.


2. Choose a current or recent topic that demonstrates ethical failures in public administration. How would social, economic, and political factors apply? How would the ethical failures affect these contexts?
There are faxes for this order.

Excerpt From Essay:

Title: President Obama's Speech to the Kids

Total Pages: 3 Words: 880 Sources: 2 Citation Style: APA Document Type: Essay

Essay Instructions: Style Analysis/Comparatve Analysis Paper

750-850 words

Choose two recent online news articles that differ in their discussion of the same person/event. Analyze differences in both content and presentation and then consider why the two accounts differ. Organize by points of difference and write to an audience not necessarily familiar with the articles.

Guidelines:
-Use only 1st or 3rd person point of view
-Use automatic page numbering and a page number header
-Do not skip lines between paragraphs
-Do not use formal documentation of sources, instead make sure to introduce all source materials in the paper.
-Works cited page still required

Excerpt From Essay:

Title: altered states of consciousness

Total Pages: 2 Words: 521 References: 2 Citation Style: APA Document Type: Research Paper

Essay Instructions: Style: APA

Sources: 2

Topic: Altered States of Consciousness

Subject: Psycology

Details: WHY DO HUMANS FIND GREAT ATTRACTION TO ALTERED STATES OF
CONSCIOUSNESS? (hypnosis, meditation, alcohol, drugs, anything that alters
the mind).
Write an essay exploring journal articles related to specific topic.
Paper should be double spaced. Support your arguments using good, solid,
informed and scholarly reasoning.
This is for PSYCHOLOGY 101 a freshman paper.
Sources should be current and come from reputable journals. Can I please be notified via email on the status of this paper. Thank you.

Excerpt From Essay:

Request A Custom Essay On This Topic

Testimonials

I really do appreciate HelpMyEssay.com. I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.

Tiffany R

I have had all positive experiences with HelpMyEssay.com. I will recommend your service to everyone I know. Thank you!

Charlotte H

I am finished with school thanks to HelpMyEssay.com. They really did help me graduate college..

Bill K