Cybersecurity Vulnerabilities Through Cyber-Attacks

Cybersecurity Vulnerabilities Through Cyber-Attacks


  • PURPOSE:   To analyze a problem and possibly provide a solution 
  • AUDIENCE:   Classmates, others interested in the field 
  • LENGTH:   750-900 words (Times New Roman font). Please do not go significantly (~10%) under or above the word count requirement. This word count includes only the paragraphs in your final  (not the Works Cited/References page or previously submitted sections).
  • SOURCES:   5 (five) sources from the APUS Library (These may include sources you used in previous assignments. Going under this number will cost points in grading.) 

Assignment Instructions 

This analysis project requires you to tackle a problem within your field of study by first exploring it, its causes, and its impacts.  Then, if you want, you can recommend one or more practical solutions to solve the problem.   

After deciding on the problem you wish to tackle, begin building questions about it. Your goal for the analysis is to answer the questions through your sources. Finding multiple angles and perspectives is ideal so that you explore those possibilities in the final paper before settling on your recommendation.  Be sure to identify what is at stake.  

Here are questions to help guide your analysis: 

1. What is the problem being addressed (explain, describe, and "prove" that it exists)?  

2. Who is affected by this problem?  

3. Why does this problem exist? (Identify the root causes.)  

4. Why does the problem persist? (Identify the major factors that contribute to the problem's ongoing presence.)  

5. What is at stake if the problem is not solved? 

  If you decide to include a solution, use these questions to guide you:   

1. Who can take action?  

2. What should they do, exactly?  

3. Why would this help? 

4. What are the positive and negative aspects of your solution(s)?