Module 5: Analytical Writing



Similar documents
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

BE SAFE ONLINE: Lesson Plan

How To Understand What A Virus Is And How To Protect Yourself From A Virus

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Don t Fall Victim to Cybercrime:

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Network Security and the Small Business

What are Viruses, Trojans, Worms & Spyware:

F-Secure Anti-Virus for Mac 2015

How To Monitor The Internet In Idaho

F-Secure Anti-Virus for Mac. User's Guide

Spyware: Securing gateway and endpoint against data theft

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Computer Security Maintenance Information and Self-Check Activities

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Threat Events: Software Attacks (cont.)

Computer Security (EDA263 / DIT 641)

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Malware & Botnets. Botnets

Stopping zombies, botnets and other - and web-borne threats

GlobalSign Malware Monitoring

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

How to easily clean an infected computer (Malware Removal Guide)

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Protecting your Identity, Computer and Property

Acceptable Use (Anti-Abuse) Policy

Operation Liberpy : Keyloggers and information theft in Latin America

Small businesses: What you need to know about cyber security

WHITE PAPER. Understanding How File Size Affects Malware Detection

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

What's the difference between spyware and a virus? What is Scareware?

Corporate Account Takeover & Information Security Awareness. Customer Training

Small businesses: What you need to know about cyber security

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS

ZNetLive Malware Monitoring

Saheel KHOYRATTY. Partner Technology Advisor

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Protecting your business from fraud

1 Introduction. Agenda Item: Work Item:

E Commerce and Internet Security

How Spyware and Anti-Spyware Work

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Emerging Security Technological Threats

COB 302 Management Information System (Lesson 8)

Common Cyber Threats. Common cyber threats include:

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

1 Introduction. Agenda Item: Work Item:

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

What are the common online dangers?

How to remove Encrypted File guide. How to manually remove Encrypted File

Retail/Consumer Client. Internet Banking Awareness and Education Program

Certified Cyber Security Analyst VS-1160

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Course Content: Session 1. Ethics & Hacking

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

The Information Security Problem

isheriff CLOUD SECURITY

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

NC DPH: Computer Security Basic Awareness Training

Acceptable Use Policy

Transcription:

Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop an analytical framework for an essay Understanding analytical writing A basic requirement for essays at university level is that they are analytical. Analysis generally involves reorganizing information from the sources or data you have been given in order to make some kind of relationship between concepts. Analytical and descriptive writing This exercise is designed to give you a better understanding of the difference between analytical and descriptive writing. Here is the beginning of two essays. After reading them, fill in the multiple choice questions in Exercise 1 below. ESSAY A Malware is short for malicious software, which means computer programs that are designed to interfere with normal computing operations. Malware includes computer viruses, worms, Trojan horses, spyware, botnets and any other unwanted software or program. There are two main types of malware: ones that replicate or copy themselves and ones which do not copy themselves. Self-replicating malware includes viruses and worms. A virus is attached to a software program and it modifies or damages a userʼs computer files. A worm, however, is not attached to a program. It does not usually damage files but it is designed to spread by making copies of itself on other computers on the same network. Worms can send thousands of spam emails to other computers. Spyware does not replicate itself or spread directly like a virus or worm. Instead, its purpose is to gather information about users. Spyware may contain a keylogger that identifies the userʼs keystrokes when entering a password or credit card number. Other spyware programs known as adware redirect search engine results to paid advertisements or start pop-up advertisements. Malware can be transmitted in three ways. Firstly, Malware can be sent to users by email. Emails pretending to be from banks ask individuals to provide their banking passwords. Other emails direct the customer to click on an attachment that can contain a malicious virus. Malware can also be hidden in downloads from the internet. Trojan horses are programs that are hidden within another program. 1

They may appear to be something harmless, such as a free internet software download, but a Trojan horse conceals a harmful virus or worm. It may delete the userʼs files or install more malicious software. For example, the Torpig Trojan stole login credentials from approximately 250,000 online bank accounts as well as a similar number of credit and debit cards (BBC News 2008). Malware can also be spread by sharing portable media such as CDs, DVDs or USB storage drives. If there is malware on the shared media, it will spread from computer to computer. ESSAY B Malware attacks can have serious consequences for individuals, businesses and government computer networks. Malware is short for malicious software, which means computer programs that are designed to interfere with normal computing operations. Individuals, businesses and governments are vulnerable to theft and loss of private information, while the costs of preventing and repairing malware are huge for businesses and government. The most significant consequences for individuals are financial loss and invasion of privacy. Identification of private banking information such as user passwords and credit card details through spyware can enable a criminal to steal funds without the user being aware (Teller 2011). Redirection of search engine results to paid advertisements or undesirable websites can persuade individuals to part with money (Zorz 2011). Invasion of privacy is another consequence of Malware, as identity theft is become more common (Australian Privacy Foundation 2009). Implications of malware for businesses are serious. At an organisational level, network and data protection are costly. In the event of a Malware attack, interruption to an organisationʼs website or e-mail systems can cause significant loss of sales and even more importantly, loss of customer trust in the company (Yin 2011). Remediation after a Malware attack involves significant cost to businesses. Consequences of malware for governments can involve loss of sensitive information and increased costs for detection and prosecution of internet crime. Government departments can themselves be targeted by malware, with sectors such as Defence and Social Security being particularly attractive to attack (Davis 2010). Governments are also under pressure to respond to increased cyber attacks by investing huge resources in internet crime prevention, internet crime regulation, additional policing measures and changing legislation for harsher penalties for offenders (Cowdery 2005). 2

!"#$%&'#()( Choose the best answer for each of these items. Tick the box under Essay A or Essay B to show if the item is correct: ESSAY A ESSAY B 1 This type of essay is (i) a descriptive type [ ] [ ] (ii) an analytical type [ ] [ ] 2 The essay is about (i) consequences of malware [ ] [ ] (ii) types of malware [ ] [ ] 3 The essay (i) contains a main point to be argued [ ] [ ] (ii) does not contain a main point to be argued [ ] [ ] 4 The essay answers the instruction: (i) Evaluate the consequences of malware [ ] [ ] (ii) Describe the main types of malware [ ] [ ] Analysing information and ideas In the process of planning to write an analytical essay, starting from reading the essay question and continuing through all the reading and researching you do, there are a number of processes that should be going on simultaneously: You should be seeking to understand the relationships amongst the individual pieces of information and ideas. You should be trying to organise these pieces into some groups according to the relationships amongst them, and to give each group an abstract heading. You should be trying to establish some overall picture of how these groups relate to each other, of how they contribute to making a whole picture. You should be as flexible as possible to the thought of changing this picture and its parts as often as it is necessary. Developing an analytical framework for an essay Many students find it useful to develop an analytical framework or taxonomy which represents the way pieces of information have been grouped and related to others. There are many different ways of structuring information and ideas that are to be included in an essay. The structure that you set up might be a reflection of the way these things are 3

structured in the real world, for example the way one thing happens after another in a time sequence. Or the structure might be based on your own interpretation of the real world, for example, the way you think one thing is more important than another. This is a framework for Essay A. Is it mainly concrete or abstract? Explain your reason for this answer. Malware Types Ways of spreading malware Self replicating Non replicating Email Downloads Virus Worm Spyware Adware Shared media!"#$%&'#(*( Draw a framework or taxonomy to show the way Essay B is structured. Analytical frameworks involve abstract concepts as the basis for an essay. Here are some common abstract frameworks: Advantages and disadvantages Issues or problems 4

Factors, causes or reasons Consequences These can help you organise your ideas in your essay and move to the detailed planning stage of your essay preparation. Answers!"#$%&'#()( ESSAY A ESSAY B 1 This type of essay is (i) a descriptive type [!] [ ] (ii) an analytical type [ ] [!] 2 The essay is about (i) consequences of malware [ ] [!] (ii) types of malware [!] [ ] 3 The essay (i) contains a main point to be argued [ ] [! ] (ii) does not contain a main point to be argued [!] [ ] 4 The essay answers the instruction: (i) Evaluate the consequences of malware [ ] [!] (ii) Describe the main types of malware [!] [ ] (!"#$%&'#(*( financial loss Consequences of Malware individuals businesses invasion of privacy cost loss of customer trust information loss government cost detection prevention 5