Essay Instructions: Style
In all questions, follow the Publication Manual of the American Psychological Association. Graduate student should have a copy. Otherwise, check out www.apastyle.org. In Web Tycho, do the APA tutorial.
References and Bibliography
Cite references in your text by using the author-date method. Examples
Walker (2000) compared reaction times.
In a recent study of reaction time (Walker, 2000).
You will no doubt be using internet references. In the website mentioned above, click on “electronic references” for the correct manner of stating internet sources in your bibliography. In the manual, refer to page 270.
Format
All work must be typed.
Use 1" margins on all sides of the paper (8.5 x 11 or A4)
Use Times New Roman, 12 points.
Use double spacing.
Use appropriate headings and subheadings. (pages 10-11) The first word of each new paragraph should be indented from the margin.
Number each page in the bottom right corner. The cover page should not be numbered.
Use a cover page (title page) for the paper. See page 10. In the center of the page, in this order, double spaced, put:
Your Name
Course Number and Name
Title of the the paper
English Style and Grammar
All of the errors listed below have occurred and continue to occur.
In the discussion on p.37-39, notice that the Manual does not even consider the use of the word “you,” because such an error does not even occur to the author. Do not use the pronoun “you” in your paper! This is a serious breach of style. Example:
“Having your identity attached to your every thought and opinion .. will surely deter open ended and honest discussions about governmental policies.”
Do not use the pronoun “we” in your paper. You are not royalty, nor may you assume that I am helping you or agree with you! Perhaps the following joke will help the point stick in your mind.
The Lone Ranger and Tonto are surrounded by hostile Indians.
The Lone Ranger turns to Tonto and says, “What do we do now, Tonto?”
Tonto replies, “What do you mean by ‘we’, paleface?
The section on grammar (p. 40-61) is well worth reading. Unfortunately, once again the Manual does not even consider errors which are commonplace in student papers. I refer, for example, to sentence fragments, which lack either a subject, or a verb, or sometimes both:
“Not to mention that criminal’s records are also made public.”
“Which applies to the authors of original works of authorship which includes literary, dramatic, musical, artistic, and intellectual works.”
Other common student errors are:
Its vs. it’s
There vs. their vs. they’re
You’re vs. your
Whether vs. weather
Agreement: “Every PC user should install encryption on their PC.” (Should be “his PC” or “his or her PC”
Use of commas:
The boy, and the girl went to the store. (no comma after “boy”)
The boy went to the store, the girl went home. (Wrong)
The boy went to the store; the girl went home. (right)
The boy went to the store and the girl went home. (right)
The boy went to the store, while the girl went home. (right)
The following is both a rhetorical question (bad style) and a run-on sentence:
“My question to you is the FBI considered a friend or an enemy?”
In this regard, refer to this Wikipedia article http://en.wikipedia.org/wiki/Complex_sentence and also the articles on simple and compound sentences. Many students have considerable difficulties with regard to sentence structure. There is no obligation to use compound and complex sentences if one has difficulty in using them correctly.
Finally, the following sentence is taken from a published book! This is clumsy, confusing, and illogical.
“Every company won’t have to have an IDS”.
Write in a neutral, unemotional, and professional manner. Avoid appeals to patriotism, motherhood, or whatever you think everyone agrees with. Avoid rhetorical questions.
Example
For an example of a good, impersonal, professional style, consult the following document:
“Guide to Intrusion Detection and Prevention Systems” Recommendations of the National Institute of Standards and Technology.
http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
David A. Christie
INFA610
Computer Security, Software Assurance, Hardware Assurance, and Security Management
Title of the MIDTERM paper
INFA 610 First Paper DAVID CHRISTIE 24JAN2011 to 01MAY2011
First Individual Paper: 20%
You will be graded on two short papers of 5-6 pages in good APA style.
The first paper is to be on a technology issue in information assurance.
Format
All work must be typed.
Use 1" margins on all sides of the paper (8.5 x 11 or A4)
Use Times New Roman, 12 points.
Use double spacing.
Use appropriate headings and subheadings. (pages 10-11) The first word of each new paragraph should be indented from the margin.
Number each page in the bottom right corner. The cover page should not be numbered.
Use a cover page (title page) for the paper. See page 10. In the center of the page, in this order, double spaced, put:
Your Name
Course Number and Name
Title of the paper
http://iase.disa.mil/
Information Assurance ??" Info is there in its integral form when needed.
Technology issue ??" talk about the Iranian worm powerplant issue. How it originated, grew, and concluded.
They used different computer systems to … it can be put into your computer and do nothing…. Put in iran power plant it will crash it.
http://www.google.com/search?hl=en&safe=active&rls=com.microsoft%3Aen-us%3AIE-SearchBox&rlz=1I7ADBS_en&q=Internet+security+flaws&aq=f&aqi=g10&aql=&oq=
http://www.sans.org/top-cyber-security-risks/
http://www.cs.berkeley.edu/~daw/papers/endpoint-security.html
http://www.nytimes.com/2008/07/30/business/worldbusiness/30iht-flaw.4.14893974.html
http://www.crn.com/news/security/18808689/experts-list-top-10-internet-security-flaws.htm;jsessionid=4P2bxFIlGfDgCdfzlU7XLQ**.ecappj01
http://resources.metapress.com/pdf-preview.axd?code=w6p14188v172g63p&size=largest
http://www.defensesystems.com/Articles/2010/07/14/Navy-cybersecurity-information-assurance-directive.aspx
http://www.fas.org/sgp/spb/whitepap.html
Read that magazine: The Economist, titled, “Cyberwar Threat from the internet” and see where you can use or get some key information.
http://www.economist.com/node/16478792
What will cyberwar look like? In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes. Computer bugs bring down military e-mail systems; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery.
(Murphy, 2010)
Murphy, M. (2010, July 01). War in the fifth domain. Then Economist, 396(8689), 3.
http://www.economist.com/node/16481504
http://www.economist.com/node/16481504/comments
http://blog.cybersecuritylaw.us/2010/07/the-economist----cyberwar-the-threat-from-the-internet.html
http://www.time.com/time/covers/0,16641,19950821,00.html
http://www.time.com/time/specials/packages/article/0,28804,2037744_2037563_2037736,00.html
http://www.google.com/search?q=Time+magazine%27s+cover+story+on+%22CYBER+WAR%22&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Google Search: http://www.google.com/search?q=The+Economist+The+threat+from+the+internet&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Good summary: http://en.wikipedia.org/wiki/Information_assurance
Google Search: http://www.google.com/search?q=Information+Assurance+issues+of+today&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Look in and research via your membership with ACM & Microsoft TechNet and see if you can come up with anything.
Site the Bruce Willis Movie, “Live Good, Die Hard”
INFA 610 First Paper DAVID CHRISTIE 24JAN2011 to 01MAY2011
First Individual Paper: 20%
You will be graded on two short papers of 5-6 pages in good APA style.
The first is to be on a technology issue in information assurance.
http://www.fas.org/sgp/spb/whitepap.html
Read that magazine: The Economist, titled, “Cyberwar Threat from the internet” and see where you can use or get some key information.
http://www.economist.com/node/16478792
What will cyberwar look like? In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes. Computer bugs bring down military e-mail systems; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery.
(Murphy, 2010)
Murphy, M. (2010, July 01). War in the fifth domain. Then Economist, 396(8689), 3.
http://www.economist.com/node/16481504
http://www.economist.com/node/16481504/comments
http://blog.cybersecuritylaw.us/2010/07/the-economist----cyberwar-the-threat-from-the-internet.html
Google Search: http://www.google.com/search?q=The+Economist+The+threat+from+the+internet&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Good summary: http://en.wikipedia.org/wiki/Information_assurance
Google Search: http://www.google.com/search?q=Information+Assurance+issues+of+today&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en
Look in and research via your membership with ACM & Microsoft TechNet and see if you can come up with anything.
Site the Bruce Willis Movie, “Live Good, Die Hard”
FIRE SALE
Myth?
3 step systematic attack on the entire national infrastructure
1. Take out all of the transportation
2. Financial base & telecoms
3. Get rid of all utilities; gas / water / electric / nuclear / pretty much anything that is run by computers (which today is almost everything).
4. That’s why they call it a File Sale because everything must go
If you take out any one (x1) thing the system can recover, however, if you take it all down the system crashes.
“You write one little piece of code and the world falls apart.”
Virtual terrorism
Eastern Power Grid
Middleton, WV
http://www.imdb.com/title/tt0337978/goofs
http://www.filmsite.org/series-diehard4.html
http://www.nationalgrid.com/