Emerging Threats and Countermeasures Discussion.

Emerging Threats and Countermeasures Discussion.

Question 1: Write a 500 word essay (APA format & 2 latest scholarly journal article references 2016 on words)

Attacks on our national infrastructure are already happening. And the expectation is that they will continue to increase at an accelerated rate. For this week’s discussion, we’ll cover threats to our nation’s pipelines. To get started, read this article:


ANSWER IN SHORT ESSAY: After reading the article, write a short essay and discuss how the types of threats discussed in the article referenced above could impact our economy, and how implementing Commonality (as discussed in chapters 5) could help mitigate these threats.Emerging Threats and Countermeasures Discussion.

***concentrate on Commonality topic in your answer***

For reference use attached Chapter5_Commonality.pdf

Subject: Physical Security

Question2: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)

Compare and Contrast the Two Different Types of Door Bolts. (Consider keyCards, Dial or combination or Keypad locks, Biometrics Locks)

Must be at least 400+ words in length. All citations must be in APA format.


Subject: Analyzing and Visualizing Data

Question 3: Write a 400+ word essay (APA format & latest scholarly journal article references 2016 on words)

As noted by Kirk (2016), angle, framing, and focus are useful perspectives that help to shape your editorial thinking. Select one of these perspectives and mention why you selected it.

Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.

Subject: Information Governance  

Question 4: Write a 400+ word essay (APA format & latest scholarly journal article references 2016 on words)

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. Emerging Threats and Countermeasures Discussion. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact.

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?

Question 5: Write a 400+ word essay (APA format & latest scholarly journal article references 2016 on words)

While blockchain is successful with cryptocurrencies, it is also beneficial for information governance in businesses.

After reading this article  (https://www.everteam.com/en/role-of-blockchain-in-information-governance/), discuss at least two ways you foresee blockchain transforming information governance in businesses. Be sure to utilize sources and provide at least one detailed example of your findings.

Question 6: Write a 400+ word essay (APA format & latest scholarly journal article references 2016 on words)

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper (google or amazon), discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.

Question 7: 3 pages of Annotated Bibliography ****  (use attached AnnotatedBibliography.docx for the reference and details)Emerging Threats and Countermeasures Discussion.

Your paper requires that you use at least 10 references – five of them from peer-reviewed scholarly journals accessible from the UC Library.  Click the Library Resources on the navigation bar.  Develop a full annotated outline of the paper including sections in which each resource will be used.  Note that you can find many examples of how to build an annotated bibliography.  Your Bibliography should be about 3 double-spaced pages in length as a guideline.   Here is more information –  https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

FOR LIBRARY, USE THE LINK: https://www.ucumberlands.edu/library

Emerging Threats and Countermeasures Discussion.

Calculate the price of your order

The price of a paper depends on the number of pages, academic level and the urgency. Our prices are discounted and start from as low as $10 per page. To know how much you would pay for an order, fill in the basic paper details.

Confidentiality and Security

We take confidentially of our customers seriously. This is the reason we use only PayPal to make payments that require only an email. This means you can order and pay for your order without disclosing your full identity and with no trace to you or your credit/debit card details as this information is only shared with PayPal, a trusted international payment system. Our website is also encrypted to ensure additional security. In addition, we never sell your paper nor divulge the paper or client details to anyone.


We write all our papers from scratch and never plagiarize at all. Our papers are 100% original with no plagiarism element even when many students place a similar order with us. You are guaranteed of a custom-made non-plagiarized paper that you cannot find anywhere else even in part whenever you order from us.


Professional writers in the various fields who have a wealth of experience in academia write all your papers. You are, therefore, guaranteed of a well-researched paper with the right content and in the correct structure. All our papers are properly referenced and any sources used are correctly cited using your preferred referencing styles such as APA, MLA, OSCOLA, Harvard, Chicago/Turabian, Vancouver, or any other referencing style you prefer.

Our services are legal and acceptable

Do you know that it is legal to seek our academic writing services and is not against the policies of your university, college or any other learning institution?
You are not prohibited from getting our custom-made papers if you use them in any of the following ways;

  1. As a source for additional understanding of the subject
  2. As a source of ideas for your research, in this case, it should be properly referenced
  3. For proper paraphrasing as per your schools plagiarism definition and acceptable paraphrase
  4. Direct citing in your work, when properly referenced.