Research Writing - Discussion on Cybersecurity
Instructions
The objective of this activity is to help you become familiar with UMUC Databases, searching, keywords, and research (umuc.edu/library). Please complete the following steps after viewing video tutorial #1:1. Conduct a keyword search around an idea, or topic, of your choosing (cybersecurity). 2. Take notes on your keyword search. (You will use them later in class.)3. After you've searched, please post your keyword and the author and title of the article you found.4. In addition, please post a short summary of the article. Your summary can be 50-100 words.
Answer
CybersecurityKey WordsEffective, Cyber-security, StrategiesNotes on Keyword SearchSearching the keywords was crucial in enabling me identify the article of interest based on the specific key terms which were contained within. I specifically used the Google Scholar search engine with the need to identify articles which align to the terms of interest. I also focused my search to articles which were published in the last five years. The aim was to obtain an article which is relevant. Thus, the information contained within can be deemed highly appropriate in helping address the various cybersecurity challenges currently experienced in various spheres. It is also important in helping show the various gaps which are attained in the process of ensuring that better cyber-security mechanisms are at...
To avoid plagiarism, part of the answer is hidden. Click on the button below to order the full answer.
Order Answer
Back
Price Calculator

Why we are Ranked the best
- Unlimited Revisions
- Free 24/7 Support and chat
- Money back guaranteed
- Low prices with discounts
- Experienced writers.
- Free Unlimited support