Answer & Explanation:5 sources, short summary for each source, The subject is about Access Control and Operating System security.
5_summaries_of_the_source.docx
Unformatted Attachment Preview
• 5 summaries of the source (4 sentences each) – 2pts
each
• 2 scholarly articles (scholar.google.com)
• 1-2 magazine – publications
• 1-2 blogs – websites
• Specific to the week’s topic (Access Control)
•
Remember that all sources must be from 2014 or later
•
The five summaries must consist of :
•
•
•
•
•
•
two scholarly articles,
one-two magazines/publications,
one-two blogs/websites (no wikipedia or anything sketchy – if you are asking if
or thinking it is sketchy, it is sketchy).
The summary should explain the content (1 pt) and the importance to someone in
the cyber security domain (1 pt).
The summary should emphasize how the article adds to the community (builds on
the pasts) [Additive].
When selecting and reading the resource, consider
•
•
•
Why the article is worth someone’s time to read?
How is the article benefiting the community?
And What new do (does) the author(s) offer?
Article 1 Title – Author(s) – Year of Publication – Journal Article
URL to article
Brief writeup (4 sentences)
Article 2 Title – Author(s) – Year of Publication – Journal Article
URL to article
Brief writeup (4 sentences)
Article 3 Title – Author(s) – Year of Publication – Article Type
URL to article
Brief writeup (4 sentences)
Article 4 Title – Author(s) – Year of Publication – Article Type
URL to article
Brief writeup (4 sentences)
Article 5 Title – Author(s) – Year of Publication – Article Type
URL to article
Brief writeup (4 sentences)
…
Purchase answer to see full
attachment