Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Dissertation Expert

Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.

A practical research paper takes in account a real-world cyber issue that affects business, government, or industry and takes a holistic approach to the issue.

Thesis type paper will be APA formatted, and consist of 40-45 pages.

Paper Outline

1. Introduction: Thesis: Diverse and appropriate methods that can be applied to increase thesecurity of space-based networks owned by the United States Department of Defense.

• Statement of the Problem: Thespace-based systems are vulnerable to attacks fromadversaries. Successful attacks can pose detrimental effects to the nation. These effects may leave the nation vulnerable to attacks and expose its confidential data to rivals and competitors (Adams, 2001).

• Scope: Details two different perspectives on vulnerability; Direct Threats to the United States space systems and threats to the United States Military forces (Spacy, 1999).

• Methodology: The research will make use of

• Object tracking and identification measures

• Optical tracking and imaging systems

• Radar tracking and imaging systems to assess the effectiveness of the proposed methods in increasing security of space-based networks.

• Theoretical Framework:Details the current situation of the communication systems of the State Department. It then gives a comprehensive report of potential harm that may be inflicted on the nation as well as the department in the event of a successful attack. It then details theoutcome of applying measures to increase thesecurity of space-based networks (Peña and Hudgins, 2002).

• Hypothesis: The section will detail anticipated outcomefrom the application of the proposed methods to improve thesecurity of the space-based communication systems.

• Review of Literature: The section will highlight previously highlighted literature on the topic. It will detail measures placed on the protection of the systems as published in theprevious literature. It will also point out loopholes within these measures published in theliterature. It will highlight previously published recommendation on safeguarding the communication systems pointing out instances of failure and success.

• Limitations of the Study: The research will point out that insufficient resources and analysis apparatus to be used in the research methodology. For instance, testing using object tracking and identification measures to ascertain a loophole and eventually come up with a solution to mitigate it (Peña and Hudgins, 2002).

• The significance of the Study: The section will highlight the importance of the study ofthe nation and the military defense forces. It will highlight that the provision of appropriate methods will be instrumental is safeguarding the nation's interests as well as addressing security concerns (Tellis, 2007).

2. Body

• Background of the Study: This section will detail instances in which the departments' communication systems have been vulnerable to attack. It will detail each occasion giving the date and source of theattack. It will also give accounts of the level of the breach; whether it was fruitful or not. Also, it will point out designs employed by the attackers in committing the attack, in conclusion, it will point out gaps that the attackers took advantage of (MacDonald, 2008).

• Presentation of Prevention Methods: The section will give three recommended methods to be used in safeguarding the United States Department of Defense space-based communication systems. The methods were arrived at based on the methodology applied to seal gaps in the communication systems(MacDonald, 2008). The three methods will include:

- The use of Counter Space Denial and Deception,
- The use of Electronic Attacks on communication, data and command links
- The use of Standoff Weapons

• The impact of Counter Space Operations: This section will detail potential implications of the application of the countermeasures that deal with attacks that bank on the vulnerability of the counter system. It will highlight that some of the measures applied may be subject to retaliation in the event they cause substantial harm to the attacker resources (Phillips and Swiler, 1998).

3. Conclusion

The research will end by acknowledging the importance of having measures to protect the department from external attack. It will also highlight instances where agencies failed to implement strategies to safeguard systems and their consequences.

Dissertation, Writing

  • Category:- Dissertation
  • Reference No.:- M91888548
  • Price:- $250

Priced at Now at $250, Verified Solution

Have any Question?


Related Questions in Dissertation

Dissertation for a bachelors degree in actuarial

Dissertation for a Bachelor's Degree in Actuarial Science Estimating the Survival Rates of Infants Using Efron’s Algorithm and Cox-Regression Methods Introduction Literature Review Methodology Results and Discussion Conc ...

As a consultant to a leader in a united states corporation

As a consultant to a leader in a United States corporation, you have been hired to lead a diverse team in the development of a global organization. The organization is planting business operations in Greece, Singapore, G ...

You have just been hired as the chief executive officer ceo

You have just been hired as the chief executive officer (CEO) in a medium-sized organization. The organization is not suffering financially, but neither is it doing as well as it could do. This is largely because the org ...

Assignment - write a dissertation on given

Assignment - Write a Dissertation on given topic. Dissertation Topic: Are Abu Dhabi Public Sector Organizations Ready for Open Innovation? Carry out Primary and Secondary Research to complete the study. Include each and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As