Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
3 Sources
Style:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Assignment 2, Milestone 1: Draft. Hacking Back. Literature Essay

Essay Instructions:

Okay—you've got a drafting plan and a working thesis statement. Those are the bones of your persuasive essay. Now let's add some meat (that'll be your argument)! Rest assured—if your thesis statement or drafting plan changes as you begin shaping the argument, that's okay. Use the following guided walkthrough to get started on turning the work you've done so far into a persuasive essay that argues your claim and considers opposing viewpoints.
Constructing Your Persuasive Essay Draft
Answer the questions below to generate a draft of your persuasive essay. Before you begin, you should refer to the assignment guidelines and rubric (click here) to make sure you're fulfilling each aspect of the assignment. You can also download/print the rubric.
We'll be using the PIE method to structure supporting paragraphs, so feel free to look back over that material. Although this activity only requires five paragraphs, keep in mind that the first draft is only a starting point, and you may wish to expand your paper for the final submission in Module Seven.
I. Introduction
This is where readers will have a chance to get an idea of what your essay will be about and what you will prove throughout. Do not give all of your information away here, but give readers a sample of what is to come. Do not forget to review your writing plan to make sure you are hitting all of the points that you planned out, while also stating your argument.
Introduction Paragraph: What is the topic of your essay? How do you plan to grab your reader's attention at the beginning of your essay?
Introduction Paragraph: What is your thesis statement?
II. Body
The body is your opportunity to describe the support your argument in depth. Make sure your thoughts and evidence are clear and organized in a way that is easy for readers to follow and understand.
Supporting Paragraph 1: What is the first main point or reason of your paper?
Supporting Paragraph 1: What evidence have you found that supports your point?
Supporting Paragraph 1: Explain how this evidence supports your point.
Supporting Paragraph 2: What is the second main point or reason of your paper?
Supporting Paragraph 2: What evidence have you found that supports your point?
Supporting Paragraph 2: Explain how this evidence supports your point.
Supporting Paragraph 3: What is the third main point or reason of your paper?
Supporting Paragraph 3: What evidence have you found that supports your point?
Supporting Paragraph 3: Explain how this evidence supports your point.
Supporting Paragraph 4: What is the first counterargument you will respond to?
Supporting Paragraph 4: How do you respond to or rebut the counterargument described above?
Supporting Paragraph 5: What is the second counterargument you will respond to? (You may not have a second counterargument, and that's okay—make sure you address at least one, though.)
Supporting Paragraph 5: How do you respond to or rebut the counterargument described above? (You may not have a second counterargument, and that's okay—make sure you address at least one, though.)
III. Conclusion
Think of the conclusion as a review of your argument. Use this section to restate your argument and remind readers of your supporting evidence. Think of this as your last chance to persuade readers to agree with you.
Conclusion Paragraph: What were the most important points you made in the responses above?
Conclusion Paragraph: Reiterate your thesis statement. Be sure to state your thesis statement differently than you did in the introduction paragraph.
***I have attached the previous papers you have written for me and the rubric.
****You also have written papers due on 10/4/2018 that might also help with this paper. One is the thesis statement.

Essay Sample Content Preview:

Hacking Back
Students Name
Institutional Affiliation
Given the advancements in technology, all organizations have a computer system that is used to control computer-based activities. These systems are prone to hacking. Therefore, in the case of a cyber-attack, organizations are faced with the challenge of what to do next. Even though some organizations might consider hacking back as the best solution, I believe that it is not the right solution to cyber-attacks and there are other solutions. There are other solutions for dealing with cyber-attacks such as the creation of strong password policies and the destruction of the hacked data.
Hacking back creates endless battles between the hacker and the organization being hacked hence risking the loss of more data. Also, it creates the possibility of the hacker exposing the data that they had already hacked and, this can have negative impacts on the reputation of the company. For instance, the data might have been very crucial to some of the clients and, hence, the hackers can decide to blackmail them. Before a client trusts to keep their data with a certain company. They are assured that the data will not be accessible by a third party and therefore, they do not expect the organization to lose. Hence, the organization should not hack back since this can result in their clients finding out that their data has been leaked. The outcome is that most of the clients will withdraw their services with that organization. Therefore, it is not good to hack back.
The creation of strong passwords reduces the chances of a company being hacked into. Companies should ensure that the Information and Technology team is up to date with the current system requirements. This enables the workers to change their passwords regularly. As well, the password policy should prevent the employees from using a password that they have used before this stands the hackers a better chance of guessing the password. Also, there are obvious passwords that cannot be used such as a personal identity card number or their mobile phone number. Most people choose these as their passwords and, therefore, they can easily be guessed by anyone hence allowing a third party to access the organization's data. The IT team should ensure that they have clear login records for all the employees so that they can be able to detect any suspicious activity and act on time. Employees should also be given strict rules ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples: