Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Your research is to be incorporated into a three to five page written analysis of the attack or incident. Your analysis must be supported by five or more authoritative sources which you cite using APA formatted in-text citations and references (in your reference list). Your paper for this assignment must be submitted to your instructor's TurnItIn section for Originality Checking.

Detailed Assignment Description:Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

  • For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.

Pre-approved topics include

  • Adobe Source Code & Customer Data hacked (2013)
  • APT1 (see Mandiant report of People's Liberation Army cyberattacks)
  • Cryptolocker Ransomware (2013)
  • DigiNotar Certificate Theft / Compromise (detected in 2011)
  • HomeDepot data breach (2014)
  • Operation High Roller (detected in 2012)
  • Gameover ZeuS botnet (countered by Operation Tovar; made public in 2014)
  • RSA SecurID breach (2011)
  • Target data breach (2013/2014)
  • Telephone Tech Support Scam (2014) see http://www.ic3.gov/media/2014/141113.aspx

You may propose an alternate topic for your instructor's approval. Approval is NOT guaranteed. Your request for approval should be posted as a message in the Ask Your Instructor conference.

1. Short Topic Name

2. URL for news article about the security incident or attack that you will research for your paper

3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.

Ideas for additional topics can be found on various security-related websites, including

  • ID Theft Resource Center (2014 Data Breach Reporthttp://www.idtheftcenter.org
  • Bruce Schneier on Security http://www.schneier.com/blog/
  • Carnegie-Mellon CERT: http://www.cert.org/insider_threat/study.html
  • CSO Onlinehttp://www.csoonline.com/
  • Data Breach Today http://www.databreachtoday.com
  • SC Magazinehttp://www.scmagazine.com/
  • Symantec: http://www.symantec.com/threatreport/
  • US-CERT: http://www.us-cert.gov/security-publications/#reports

After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:

  • identifying the type of breach
  • identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
  • identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
  • identifying and discussing technological improvements that would help prevent recurrence

Formatting Requirements: use the Basic APA format paper template found under Content > Course Documents > APA Resources. See style gallery for styles that will give you the required paragraph and headings formatting. Your file must have a separate title page and separate reference page.Sample CSIA Research Paper: Consult the sample CSIA paper provided under Content > Course Documents > APA Resources.

Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91376298
  • Price:- $20

Guranteed 24 Hours Delivery, In Price:- $20

Have any Question?


Related Questions in Computer Engineering

How does the monopolies make production and pricing

How does the Monopolies Make Production and Pricing Decisions in Economics?

How do you calculate the number of atoms given the weight

How do you calculate the number of atoms given the weight of an element, such as nitrogen?

Your solution will entail writing a function called

Your solution will entail writing a function called TimeDifference and a test main that demonstrates that you can compute the time difference in minutes between the two times. TimeDifference is a function that receives a ...

Scenarioyour algorithm will keep track of a customers

Scenario Your algorithm will keep track of a customer's purchases at the local fireworks stand. Customers will not know exactly how many items they will purchase, so using a For loop on this lab is not allowed. Let's kee ...

Systems and networksconsider communication between a sender

(Systems and Networks) Consider communication between a sender and receiver. Using a time-space diagram, illustrate reliable transmission of a message consisting of 5 segments using the selective-repeat protocol with N=3 ...

Question what are the subnets that can be supported with

Question : What are the subnets that can be supported with this prefix 204.15.5.0/27. How many hosts can be supported by each of these subnets? Please typewrite your answers, no handwritten answers please.

Question suppose a computer using direct mapped cache has

Question Suppose a computer using direct mapped cache has 2 40 bytes of byte-addressable main memory and a cache of 64 blocks, where each block contains 32 bytes. a. how many blocks pf main memory are there? b. what is t ...

1 select one of the topics listed below and discuss

1. Select one of the topics listed below and discuss it. Describe an application that you have to solve by using at least 2 Excel functions. It can be Math, Statistics, Engineering, Financial, etc. Explain what Excel fun ...

Recursive greatest common divisor the greatest common

(Recursive Greatest Common Divisor) The greatest common divisor of integers x and y is the largest integer that evenly divides both x and y. what is a recursive function gcd that returns the greatest common divisor of x ...

Listen to or read the transcript of this podcast

Listen to (or read the transcript of) this podcast (https://www.stlouisfed.org/education/economic-lowdown-podcast-series/episode-16-elasticity-of-demand) from the Federal Reserve Bank of St. Louis. describe your experien ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As