Apa-format these references, put them on a word document along with a short abstract or review of each of the reference with its content and how you will be using them in your project paper.

Instructions
Use the attached previous work for this assignment.
Search, review, and compile 10-15 references to be used for your Project Paper. APA-format these references, put them on a Word document along with a short abstract or review of each of the reference with its content and how you will be using them in your Project Paper. I expect to see at least 10 APA-formatted references, each followed by a 1-paragraph review of the article.

As you do so, please be sure to address the application of your chosen issue’s facts, relevant procedures (legal, ethical and/or technical), as well as the concepts that you believe link all of these concepts together. 

Using this week’s required resources as a general conceptual starting point, explain how general principles of law and ethics apply to one or more contemporary cybersecurity issues.  As you do so, please be sure to address the application of your chosen issue’s facts, relevant procedures (legal, ethical and/or technical), as well as the concepts that you believe link all of these concepts together.  In addition, reflect on what you have learned about why legal professionals need to pay attention to these matters.  

However, once a year training is not nearly enough to educate people with how important they are to security and the network they use every day.

Week 6 Discussion – Question #6
There are many tools and techniques discussed on keeping data assets secure.  Staying in line with the text, discuss some of the most effective tools and preventive measures to keep organizations secure.
Example:  USE AS EXAMPLE ONLY
Some of the most effective tool and preventive measures to keep organizations secure is education and training your employees. This is the hill I am always going to die on until I am out of the military because this is the biggest problem we have in cyber. Uneducated people can be one of the biggest downfalls to any network and can be “easily” fixed if education becomes a priority of everyone. The Air Force does do a good job by requiring yearly training and if the training is not completed, their account is locked down and cannot be unlocked until they complete the training. However, once a year training is not nearly enough to educate people with how important they are to security and the network they use every day. 88% of all data breaches are caused by human error, according to researchers at Stanford University. In this new reality, it’s more important than ever for employees to understand, and take seriously, their crucial role in an organization’s data security. With the ever-increasing number of cyberattacks, employees should no longer view cybersecurity as optional or hold the mistaken belief that it’s someone else’s responsibility (Karl, p.# 3). Thank you all for reading and I hope everyone has a fantastic week!
Jon
References
Karl, T. (2022, November 4). The importance of cybersecurity awareness for all employees. United Training. Retrieved November 6, 2022, from https://unitedtraining.com/resources/blog/the-importance-of-cybersecurity-awareness-for-all-employees#:~:text=Cybersecurity%20awareness%20training%20for%20all,its%20sensitive%20data%20from%20cybercriminals.

Listening to radio online is an excellent way to experience different types of music and radio shows.

Internetradio is a form of digital audio service that is broadcast over the internet. Although it is primarily a radio service, it is also called webcasting. It is transmitted through a wired connection and does not use wireless transmission methods. Because of this, it is much easier to listen to than traditional radio stations. 
Listening to radio online is an excellent way to experience different types of music and radio shows. There are niche websites dedicated to specific genres or cultures. You can tune into the streams that interest you most, and you don’t have to worry about being late. As a true music fan, you’ll appreciate the freedom to discover new sources of entertainment. Terrestrial radio stations tend to focus on the newest and most popular songs, but these are not very exciting for music fans.
Radio online is becoming increasingly popular. Many younger generations expect instant access to entertainment and information. As a result, more radio stations are creating apps and tools that allow people to access and listen to their programs. Mobile browsing has become more prevalent, which makes radio streaming an excellent way to reach a new audience. So, why not give it a try?
Another type of radio online is internet-only radio stations. These stations focus on certain genres of music and don’t interrupt their programs with advertising. As a result, they can offer a huge variety of music genres and programs. Some even offer international stations.

Listening to radio online is an excellent way to experience different types of music and radio shows.

Internetradio is a form of digital audio service that is broadcast over the internet. Although it is primarily a radio service, it is also called webcasting. It is transmitted through a wired connection and does not use wireless transmission methods. Because of this, it is much easier to listen to than traditional radio stations. 
Listening to radio online is an excellent way to experience different types of music and radio shows. There are niche websites dedicated to specific genres or cultures. You can tune into the streams that interest you most, and you don’t have to worry about being late. As a true music fan, you’ll appreciate the freedom to discover new sources of entertainment. Terrestrial radio stations tend to focus on the newest and most popular songs, but these are not very exciting for music fans.
Radio online is becoming increasingly popular. Many younger generations expect instant access to entertainment and information. As a result, more radio stations are creating apps and tools that allow people to access and listen to their programs. Mobile browsing has become more prevalent, which makes radio streaming an excellent way to reach a new audience. So, why not give it a try?
Another type of radio online is internet-only radio stations. These stations focus on certain genres of music and don’t interrupt their programs with advertising. As a result, they can offer a huge variety of music genres and programs. Some even offer international stations.

The worm will then be able to infect the devices within the new network.

Many of you have learned about the OSI and many do not get how this is applicable beyond foundational knowledge.  I would like you to take another look at the OSI model and each layer discuss a possible security risk you see in each layer.  You will see a common theme by the end of the discussion.
Example:  Use only as example!
This week we discuss the security vulnerabilities that are found in each layer of the OSI model.  The physical layer is up first.  Vulnerabilities in the physical layer have been discussed extensively in previous weeks.  One possible security risk is for an adversary to infect a USB drive and then physically plug it in to a networked device.
The next layer is the data link layer.  It is the layer responsible for the transmission of data between nodes.  A security threat in this layer would be for a potential adversary to corrupt or alter data that is about to be sent through the node.  This would subsequently alter the data that is transmitted form its original and intended form.
The network layer is responsible for routing messages through different networks.  A vulnerability here could be a data worm that has infected a device in one network, being transported via the network layer to another network.  The worm will then be able to infect the devices within the new network.
The transport layer is the first in the upper layer and is responsible for breaking messages down in to pieces before sending them onward.  A potential vulnerability here is for the interception of unencrypted messages being sent through the transport layer by an adversary.
Session layer is next and is responsible for passwords exchanges, log offs, and termination of connections.  A vulnerability here would be an adversary keeping the gateway open and preventing the session layer from terminating the connection.  This would allow the adversary access to the data protected beyond the password gateway.
The presentation layer provides conversion service which cause character change sequences.  A vulnerability here could be an adversary corrupting the change sequence which would produce the incorrect data once it has been converted.
The final layer, the application layer is the layer most responsible for communication of the various applications being utilized.  One of the vulnerabilities present here would be the potential for a virus to cause the application layer to redirect data that flows through it.  
One of the common themes I see running through here is the spread of corruption and viruses.  Each layer has the potential to spread malicious content.  The conclusion this brings me to is that each layer must be properly defended with modern security protocols.
Jacobs, S. (2015) Engineering Information Security : The Application of Systems Engineering Concepts to Achieve Information Assurance