Sign In
Not register? Register Now!
Pages:
1 page/≈550 words
Sources:
No Sources
Style:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.2
Topic:

Milestone 1: Hacking Back Writing Notes

Essay Instructions:

Now it's time to discuss the topic you've chosen to focus on for the remainder of this project! In this assignment, you'll use a guided prompt to write notes that will help you better understand ways to approach the persuasive essay. When following the guide, remember to use instructor feedback from Week 1 when discussing your topic. If you're still unsure if the topic is fulfilling the minimum requirements of the project, here's a quick reminder: 1) it has two logical sides to the issue, 2) it is researchable, and 3) it is related to your career or degree. If you have questions or concerns, please be sure to contact your instructor as soon as possible. You can email or use the General Questions board found in your learning environment.
Constructing Your Writing Notes
The questions below will ask you to consider how the following critical elements relate to your topic:
argument*
key points*
audience*
goal*
potential resources*
evidence*
This process will allow you to develop a potential structure for effectively persuading readers to agree with your argument. This plan will be helpful in keeping your thought process on track when you begin writing and revising your essay. Each response should be one fully developed paragraph in length (5-8 sentences).
As you work on the Writing Notes, remember to refer to the assignment guidelines and rubric (click here) to make sure you're fulfilling each aspect of the assignment. You can also download/print the rubric.
1. Your argument is the main point that you are trying to make in your essay. It should clearly state your opinion on your topic. Describe the argument to be addressed in your persuasive essay and include how the argument is derived from your major, the major you are considering pursuing, or your field of work.
2. Key points are pieces of evidence that support an author's main argument. What are three possible key points for your selected topic? How do they support your main argument?
3. Your audience is the people you are addressing in your essay. Who is the audience that will be reading your essay? What potential challenges will you have supporting your argument with this demographic?
4. Your goal is the end result that you wish to achieve in writing this essay. What goal do you hope to accomplish with this essay? What will this essay need to be successful?
5. Potential resources are pieces of evidence that could be used to support your argument. List potential resources that could be used as supporting evidence for your argument, and provide a brief description of each and how they will reinforce your argument.
6. Using the resources you identified above, align specific key points of your argument with your supporting resources to begin to establish an effective essay structure.
7. Based on your argument, determine strategic places where integrating evidence would be most effective and provide rationale for each.

Essay Sample Content Preview:

Hacking Back
Students Name
Institutional Affiliation
Argument
My argument is that hacking back is not a solution to cyber-attacks. This relates to my major in information and technology because cyberattacks deal with the computer systems and networks of an organization.
Key points
The process of hacking back exposes a company to more cyber-attacks because the attacker might decide to revenge the backfiring of their efforts. As a result, this can lead to a substantial loss of data. Some cyber-attacks are not made to steal an organizational data so that they can use it for insider trading but rather done for fun. Hence, it is important to find out the possible reasons as to why the attackers wanted to steal the data before taking action. Hacking back can at times lead to endless battles between the involved parties.
As well, hacking back is costly and might end up causing a lot of losses to the company in an attempt to recover data that is not worth the cost. Information security analyst requires a high salary to recover the activities of attackers. Also, the process might require the use of costly sophisticated systems that will not be needed anymore after the recovery of the data.
Audience
This information will be helpful to both governmental and non-governmental organizations. An attack can occur to any organization and therefore, they need to be aware of the best methods of dealing with the attack to prevent further damage. Also, people that run private businesses would find this information helpful. Institutions are not an exception because students would want to change their grades by hacking into the ins...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!