Communication is used to inform, to persuade and to analyze. In this assignment, you will analyze both sides of an issue and then present a fair and objective analysis. You will practice looking at both sides of an issue by writing an argument, a counterargument, and rebuttal. Your introduction paragraph should include a “hook” to grab the reader’s attention. The thesis statement is typically seen in the first paragraph. You should use credible sources and cite them according to the style of your discipline. This time, however, you will follow this initial structure with a counter-argument in which you introduce and provide support for a contradictory point of view. Following the counterargument, you will provide rebuttal, in which you explain why your initial point of view is more compelling than the counter-argument. You should use credible sources and cite them according to the style of your discipline. The conclusion to this paper should restate the strongest points from your argument, mention the counter-argument, and then reinforce the conclusion while giving the reader something to think about moving forward. * PURPOSE: To analyze * AUDIENCE: Classmates, others interested in the field * LENGTH: 1,000 words (Times New Roman font). Exceeding the word count is not a good thing. * SOURCES: 5 sources total, with at least one from a professional journal * FORMAT: The citation style that is appropriate for your discipline * Use only third person (he/she/they) for a more professional tone. Avoid first person (I, my, us, we) and second person (you and your) in your essay. **Remember that all work submitted is to be your own original work except where properly acknowledged and cited. Do not reuse work, papers, or speeches from previous (or concurrent) classes as this violates APUS academic integrity policies. (Make sure to note the section on self-plagiarism.) ** My paper citations will be in APA style format Thesis: Cybersecurity in the technology world is a necessity. Intro: In the world today technology is forever growing and developing. With there being so many open sources of technology, each company has implemented their own cyber security measures for their products. Developing security measures that require a lot of personal data from users for proper usage. Most users and consumers dislike that most of their technology products require so much personal data, but the security that they need for their product is a must. Counterargument: They average consumer prefer to keep the minimum amount of information needed for security on their devices. If there is a will there is a way that identify thief’s can hack into almost any system. Some examples of hacking involves cell phones and applications. There have been cases where users accounts have been hacked into and pictures and other personal stuff have been stolen. Society now believes that it is best to have as less or not even at all of personal information and data on their technology products. Rebuttal: Cyber security stops about 85 percent of you most average hackers. Having security is better than no security at all. Polices and techniques that help keep most of your sensitive information safe. The need for personal data to keep accounts and information safe as a security measure is necessary due to it being information only that induvial would know. https://www.thebalance.com/how-has-hacking-evolved-with-technological-advances-1947546 Cybersecurity by John G. Voeller https://ebookcentral.proquest.com/lib/apus/reader.action?docID=1598809&query=cyber%2Bsecurity Cybersecurity Essentials by James Graham, Richard Howard, Ryan Olson https://ebookcentral.proquest.com/lib/apus/reader.action?docID=665576&query=cyber%2Bsecurity