A statement of the goal of your project. Also note how you are translating your content from Project 1 for this new assignment.
The goal of this project is to raise awareness for cyber-crime activity and the role it will play in the future. With cyberattacks constantly increasing, I want to make my targeted audience aware of the risks that they carry and what this could mean for businesses or themselves. As far as content goes, I am thinking on one specific idea. The idea is to write about a current Petya cyber-attack that has affected the world and is in the media right now. It covers the topic of cybersecurity and the worldwide ransomware attack that has not only affected business, but also countries. This would translate the content of Project 1 well, as it would cover the same topic the effect of one cyber-attack on worldwide organizations. In the article, I would write about this ransomware attack, explain it, what has happened, who has been affected, etc and why it compares to an attack that has already happened a few months ago called WannaCry. By giving these specific example, it translates well into the content of Project 1, as I gave examples of other cyber-attacks in my paper and would now write quick facts about the latest cybercrime.
Include a brief introduction paragraph. You should discuss your first project and how you’re translating information. Set up the context of your topic and approach to the assignment in this brief intro. Remember, this document should serve as a way to justify the choices you are making as a writer, so be sure to set it up with this in mind. The sections below should focus on analyzing audience, thesis, purpose, and persona (rhetoric choices in terms of style and presentation).
Where, specifically, do you intend to publish/place this information? The title of the magazine, journal, or other location must be stated. Set up as much information here as possible to make the peer review process as helpful as possible.To whom are you writing? How will this information be accessed, located, found, consumed, etc.? Make information about your intended audience clear.
Thesis/Focus of Content
What is your thesis (this might not be directly stated in the draft, depending on the situation) or the focus of your content? Are you making an argument? This information should ONLY include the thesis. What is the core approach to your content? Most times this is the shortest section, ranging from one to two sentences.
Make clear the purpose of your project (the PURPOSE, not the reason). What is your call to write—the action behind your writing? What do you want to accomplish? How do you want to affect your intended audience? Be sure to use ACTIVE verbs. Note that you might have multiple purposes, so be clear about your intentions!
Detail the style and presentation of your project (structure, organization, use of charts or graphs, use of figures or photographs or images, language, tone, etc.). Be as specific as necessary so your peers understand the rhetorical choices you’ve made (and why you’ve made them). Be sure to note how and why you are citing sources (if at all). This section requires the usage of examples from your own text as evidence. This should be the longest of all the sections in the Context Memo.
Additional Information (If Necessary)
Your assignment and approach to the assignment might warrant explanations in different ways. Clarify anything that needs potential explaining (students might use a Glossary of Terms to assist).
These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.June’s Petya Malware Attack – What it wasn’t, What it was, and What it Means for You
Perhaps the key thing to understand about the widely-reported June ‘ransomware’ attack—popularly known as Petya—is that it was not in fact ransomware.
Recall that ransomware attacks, like the WannaCry attack in May, aim to hold victims’ data hostage, usually by encrypting hard drives. Once the hard drive of an infected machine had been encrypted, WannaCry displayed a message with instructions on how to pay the ransom of $300 in Bitcoin – after which, the message stated, a decryption key would be provided to use in ‘freeing’ the victim’s machine.
In the case of the Petya attack, it now appears any semblance to ransomware was a thinly-veiled ruse. Its method for collecting payment was rudimentary and immediately disabled, which...
By purchasing this solution you'll be able to access the following files:
Solution.docx and Solution1.docx.