1. Create a virtual machine
Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class.
Create a new Virtual Machine VM.
Install Kali Linux in the new Virtual Machine (use default settings).
Refer to the Kali Linux website located in the topic Resources for additional resources.
As you go, take instructional notes and screenshots that will help to reproduce your process.
Document the installation process using the “Report Template,” located in the Class Resources.
APA format is not required, but solid academic writing is expected.
**Plagiarism is checked for both**
2. Personal Data search.
Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class.Effective research is critical for success in the cybersecurity field.
1. Perform a data search of yourself or a family member. Use the PeekYou website located in the required readings or a similar free site.
2. Become familiar with the current cybersecurity vocabulary utilized by federal agencies such as the NSA, CISA, NIST, NCSD, etc.
In a 500–750-word report, describe:
1. Findings of your personal data search: Use screen captures and step-by-step instructions to document your findings.
2. The common security threats that can affect your digital footprint. Describe several potential system attacks and the actors that might perform them.
3. Provide a brief definition of the following terms: cyber operations, cybercrime, cyberlaw, cyber threats, risk analysis, cyber-attack/breach, threat mitigation, and disaster recovery.
4. The legal and ethical issues concerning “cyberstalking.” In cyberspace, people can act in ways they normally would not if their physical presence were required. For example, school bullying used to be over when a victim transfers to another school, but with cyberstalking, a victim is forever a victim, sometimes resulting in the victim’s suicide because of cyberstalking. Propose legal regulations to combat cyberstalking. Discuss your proposed regulations from a Christian worldview.
5. How to use the “defense against attacks” theory to protect your digital identity. Make sure to include a description of several cyber defense tools/measures, methods, and components that can help repel attacks.
ASSIGNMENT TITLE HERE
Typing Template for APA Papers: A Sample of Proper Formatting for the APA 6th Edition Student A. Sample
Grand Canyon University: <Course>
<Note: Even though APA does not require the
date on a title page, it is a requirement for GCU papers.>
Running head: ASSIGNMENT TITLE HERE
Running head: ASSIGNMENT TITLE HERE
Typing Template for APA Papers: A Sample of Proper Formatting for the APA 6th Edition
This is an electronic template for papers written in APA style (American Psychological Association, 2010). The purpose of the template is to help the student set the margins and spacing. Margins are set at 1 inch for top, bottom, left, and right. The type is left-justified only—that means the left margin is straight, but the right margin is ragged. Each paragraph is indented five spaces. It is best to use the tab key to indent. The line spacing is double throughout the paper, even on the reference page. One space is used after punctuation at the end of sentences. The font style used in this template is Times New Roman and the font size is 12.
The heading above would be used if you want to have your paper divided into sections based on content. This is the first level of heading, and it is centered and bolded with each word of four letters or more capitalized. The heading should be a short descriptor of the section. Note that not all papers will have headings or subheadings in them.
The subheading above would be used if there are several sections within the topic labeled in a heading. The subheading is flush left and bolded, with each word of four letters or more capitalized.
APA dictates that you should avoid having only one subsection heading and subsection within a section. In other words, use at least two subheadings under a main heading, or do not use any at all.
When you are ready to write, and after having read these instructions completely, you can delete these directions and start typing. The formatting should stay the same. However, one item that you will have to change is the page header, which is placed at the top of each page along with the page number. The words included in the page header should be reflective of the title of your paper, so that if the pages are intermixed with other papers they will be identifiable. When using Word 2003, double click on the words in the page header. This should enable you to edit the words. You should not have to edit the page numbers.
In addition to spacing, APA style includes a special way of citing resource articles. See the APA manual for specifics regarding in-text citations. The APA manual also discusses the desired tone of writing, grammar, punctuation, formatting for numbers, and a variety of other important topics. Although the APA style rules are used in this template, the purpose of the template is only to demonstrate spacing and the general parts of the paper. The student will need to refer to the APA manual for other format directions. GCU has prepared an APA Style Guide available in the Student Writing Center for additional help in correctly formatting according to APA style.
The reference list should appear at the end of a paper (see the next page). It provides the information necessary for a reader to locate and retrieve any source you cite in the body of the paper. Each source you cite in the paper must appear in your reference list; likewise, each entry in the reference list must be cited in your text. A sample reference page is included below; this page includes examples of how to format different reference types (e.g., books, journal articles, information from a website). The examples on the following page include examples taken directly from the APA manual.
American Psychological Association. (2010). Publication manual of the American Psychological Association (6th ed.). Washington, DC: Author.
Daresh, J. C. (2004). Beginning the assistant principalship: A practical guide for new school administrators. Thousand Oaks, CA: Corwin.
Herbst-Damm, K. L., & Kulik, J. A. (2005). Volunteer support, marital status, and the survival times of terminally ill patients. Health Psychology, 24, 225-229. doi:10.1037/0278-6188.8.131.52
U.S. Department of Health and Human Services, National Institutes of Health, National Heart, Lung, and Blood Institute. (2003). Managing asthma: A guide for schools (NIH Publication No. 02-2650). Retrieved from http://www.nhlbi.nih.gov/