For this assignment, you need to address this aspect by providing the following information:
Provide one paragraph explaining the specific search method you used to locate credible/scholarly sources of information about your topic.
Identify which specific databases you searched; for example the APUS library (must search here); and Google Scholar (also a good source)
Identify the specific search terms you used in your search of the APUS Library and/or other credible databases.
Another essential element of your search method is stating explicitly that you have restricted your search to credible and/or scholarly sources (as required in this course) to ensure all of your information/evidence is credible.
Provide complete citations for each of the two (2) credible/scholarly sources of information/evidence you selected using APA format.
Technical Requirements
Your paper must be at a minimum of 1-1 ½ pages (the Title page does not count towards the minimum limit)
All AMU assignments must include a Title page with the following information: Course number and title; assignment/paper title; date; and instructor’s name.
Format the body of this paper using the following subheadings:
Research Question: “What have been the three most significant cyber threats to the US critical infrastructure during the previous ten years?”
Background Descriiption Addressing Importance of Topic (supported by at least one reference to a credible source (for practice and as a matter of good scholarship):
Background Descriiption Addressing Personal Interest in Topic (support not needed, since this relates to your own personal interest in the topic):
Search Location(s) and Terms:
The two sources you identify must be credible and/or scholarly.
Type in Times New Roman, 12 points, and double space.
Use the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
All submissions will be graded using the assignment rubric (see below).