Phishing and scam in the Internet cybersecurity

Phishing and scam in the Internet cybersecurity

Introduction to Cyber Security
Research Paper Guidelines
Purpose: To obtain a deeper understanding of cyber security through researching a topic of interest.
Scope: Any topic related to Cybersecurity will be accepted. Topics included in the book is one approach to generating ideas. Contact me if you wish to discuss the topic.
Length: 5-8 pages not including cover page, table of contents and bibliography. Use 12pt font, and double spaced.
Format:
a. Cover page
b. Table of Contents
c. Introduction
d. Discussion
e. Conclusion
f. Endnotes (if footnotes not used)
g. Bibliography
Notes: Be sure to spell and grammar check the paper. The writing should be college level and sources must be cited. Be careful to not plagiarize. Also, don’t ramble. A shorter paper that is content-driven is better than a longer paper.