Prof Hezzie

Prof Hezzie

275 orders completed

96% success rate

Response time: 7 minutes

About Prof Hezzie

Hello! I haven't uploaded my bio yet. Let's chat!

  • 2017 Joined us
  • 4.72 Review rate
  • 275 Completed projects
  • 238 Helped students

Writer’s Sample

With improving technology each day and increasing dependency on internet technology, there is an increase in cyber-attack threats threatening national security and economy. The United States being a first world country with a developed economy and with its infrastructure connected to the internet, both its private and private sectors face this threat. With an increase in cyber-attacks, the U.S. government has developed capabilities to handle and manage the increasing threats. By seizing computers belonging to companies or organizations, the organizations face reduced productivity and incur loses trying to mitigate damages created by the attacks. According to Berr, the 2017 WannaCry ransomware cyber-attack that was connected to North Koreas’ Lazarus Group crippled computers in over 150 countries worldwide, causing losses worth more than $4 billion because of reduced productivity during the attack and mitigation process. It was also linked to the cyber-attack of Sony Pictures in 2014, which led to the infiltration of the company’s emails, and copying of films that were yet to be released costing the company losses worth $15 million. Through incurring great loses, it is evident that cyber-attacks can threaten a nation’s economy. For these reasons, the U.S. government has come up with strategies, which include sharing of information among security agencies to manage and respond to the threats. Sharing of information among the security agencies improves the ability of organizations to defend themselves against cyber-attacks. In case the DoD detects malicious cyber activities, the agency can share the information with other agencies such as Department of Homeland Security and other agencies thus increasing the nation’s ability to manage the threats. Although there are strategies in place already, there is a need to partner with other countries in order to come up with uniform policies on cybercrimes as cybercriminals take advantage of geographical locations where there are no penalties for some forms of cybercrimes. Uniform policies will help in managing the threats, as the attackers will not take advantage of places without strict policies on cybercrimes to carry out their crimes.

Reviews (159)

  • All (159)
  • English (20)
  • Literature (7)
  • Psychology (7)

Review rate 4.72

Review rate 4.75

Review rate 5

Review rate 4.14

Review rate 4.72

Review rate 5

Review rate 5

Review rate 4.8

Review rate 5

Review rate 3.6

Review rate 4.8

Review rate 4.6

Review rate 5

Review rate 5

Review rate 5

Review rate 4.5

Review rate 5

Review rate 4.33

Review rate 5

Review rate 5

Review rate 5

Review rate 4

Review rate 4

Review rate 5

Review rate 4

Review rate 5

Review rate 4

Review rate 5

Review rate 5

Review rate 5

Review rate 5

Review rate 4

Review rate 5

Review rate 5

Review rate 5

Review rate 5

Review rate 4.63

customer-1927848 (1 order)

Sociology

My experience with the writer has been one to remember! EXCELLENT! I had one too many essays to write all due at the same time and I made the right choice to entrust this writer with one. I would definitely request for service again. The writer is very knowledgeable and was easy to get in touch with. Any questions or concerns that I had, I got a response within the hour. 10/10! Thank You.

customer-4137759 (0 orders)

Computer Science

Didn't follow my instructions and what I asked for. However, I provided him already with a supportive document, but he didn't follow my instructions and even the topic is not what I asked for!

customer-3926288 (23 orders)

Healthcare

This writer is not following the instructions and this the 4th revisions.. No,he has done. He does not understand the assignment. I feel he should have not mislead me and he has had 4 opportunities to correct. He has had 1 week to complete this assignment. I will complete this without this writer.

customer-4229456 (14 orders)

Other

customer-3860898 (9 orders)

Other

customer-4255995 (1 order)

Other

customer-106635 (35 orders)

my writer simple wasn't doing the work. gave him two month no progress and wasn't listening or communicating with me whatsoever.

customer-4189177 (2 orders)

Other

customer-4153178 (4 orders)

Religion and Theology

need to be consistent on citation styles specifically embedded citations, impressed with writing styles and topic depth

customer-4052308 (8 orders)

Other

He helped but we had alot of revisions. Understand that this was more than a paper. It was also dealing with Epi Info. I trust that if it was just a paper, everything would have been fine but it was not. I suggest that if you have any assignment given to this writer that you make sure he follows all the instruction before you release funds. If funds are released and you are not happy, that is on you per the policy of this website. I learned the hard way after getting a disappointing grade for my first assignment dealing with Epi Info. Overall, I appreciate all of his efforts in getting the job done and reading many messages from me.

customer-4146075 (1 order)

Physics

customer-4141086 (13 orders)

Computer Science

customer-4070500 (2 orders)

Computer Science