Write a cyber paper on communication vulnerability to attack

Assignment Help Term Paper
Reference no: EM131132023

Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.

A practical research paper takes in account a real-world cyber issue that affects business, government, or industry and takes a holistic approach to the issue.

Thesis type paper will be APA formatted, and consist of 40-45 pages.

Paper Outline

1. Introduction: Thesis: Diverse and appropriate methods that can be applied to increase thesecurity of space-based networks owned by the United States Department of Defense.

• Statement of the Problem: Thespace-based systems are vulnerable to attacks fromadversaries. Successful attacks can pose detrimental effects to the nation. These effects may leave the nation vulnerable to attacks and expose its confidential data to rivals and competitors (Adams, 2001).

• Scope: Details two different perspectives on vulnerability; Direct Threats to the United States space systems and threats to the United States Military forces (Spacy, 1999).

• Methodology: The research will make use of

• Object tracking and identification measures

• Optical tracking and imaging systems

• Radar tracking and imaging systems to assess the effectiveness of the proposed methods in increasing security of space-based networks.

• Theoretical Framework:Details the current situation of the communication systems of the State Department. It then gives a comprehensive report of potential harm that may be inflicted on the nation as well as the department in the event of a successful attack. It then details theoutcome of applying measures to increase thesecurity of space-based networks (Peña and Hudgins, 2002).

• Hypothesis: The section will detail anticipated outcomefrom the application of the proposed methods to improve thesecurity of the space-based communication systems.

• Review of Literature: The section will highlight previously highlighted literature on the topic. It will detail measures placed on the protection of the systems as published in theprevious literature. It will also point out loopholes within these measures published in theliterature. It will highlight previously published recommendation on safeguarding the communication systems pointing out instances of failure and success.

• Limitations of the Study: The research will point out that insufficient resources and analysis apparatus to be used in the research methodology. For instance, testing using object tracking and identification measures to ascertain a loophole and eventually come up with a solution to mitigate it (Peña and Hudgins, 2002).

• The significance of the Study: The section will highlight the importance of the study ofthe nation and the military defense forces. It will highlight that the provision of appropriate methods will be instrumental is safeguarding the nation's interests as well as addressing security concerns (Tellis, 2007).

2. Body

• Background of the Study: This section will detail instances in which the departments' communication systems have been vulnerable to attack. It will detail each occasion giving the date and source of theattack. It will also give accounts of the level of the breach; whether it was fruitful or not. Also, it will point out designs employed by the attackers in committing the attack, in conclusion, it will point out gaps that the attackers took advantage of (MacDonald, 2008).

• Presentation of Prevention Methods: The section will give three recommended methods to be used in safeguarding the United States Department of Defense space-based communication systems. The methods were arrived at based on the methodology applied to seal gaps in the communication systems(MacDonald, 2008). The three methods will include:

- The use of Counter Space Denial and Deception,
- The use of Electronic Attacks on communication, data and command links
- The use of Standoff Weapons

• The impact of Counter Space Operations: This section will detail potential implications of the application of the countermeasures that deal with attacks that bank on the vulnerability of the counter system. It will highlight that some of the measures applied may be subject to retaliation in the event they cause substantial harm to the attacker resources (Phillips and Swiler, 1998).

3. Conclusion

The research will end by acknowledging the importance of having measures to protect the department from external attack. It will also highlight instances where agencies failed to implement strategies to safeguard systems and their consequences.

Reference no: EM131132023

Questions Cloud

The stockholders equity section at year end : At the end of its first year of operation, Dade Corporation has $1,000,000 of common stock and net income of $216,000. Prepare
Find the articulation points in a graph : Find the articulation points in a graph. A vertex in an undirected connected graph is an articulation point (or cut vertex) iff removing it (and edges through it) disconnects the graph.
Renaissance style and mannerism in 16th century italy : Write an assignment on dramatic contrast between Renaissance style and Mannerism in 16th century Italy.-The essay consists of a style comparison between Raphael's Small Cowper Madonna and Parmigianino's Madonna with the Long Neck.
Do you agree that corporate managers would manipulate : Do you agree that corporate managers would manipulate their stock’s value prior to a buyback or do you believe that corporations are more likely to initiate a buyback to enhance shareholder value?
Write a cyber paper on communication vulnerability to attack : Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.
There is no journal entry to record the authorization : The relative lack of government regulation is an advantage of the corporate form of business.
Find the minimum number of dice : Find the minimum number of dice throws required to reach the destination or last cell from source or 1st cell.
Does cooperation require equal resources from all partners : From your research, discuss specific ideas or concepts regarding what proactive role can the HR department serve in helping the C-suite think about balancing competition and cooperation?
Which dividend policy would you recommend : Analyze each of the three dividend policies in light of GAC's financial position. Which dividend policy would you recommend? Justify your recommendation. What are the key factors to consider when setting the amount of a firm's initial annual dividend..

Reviews

Write a Review

Term Paper Questions & Answers

  Case study: big red apples

The first turning away from the easy, natural flow of my life occurred in an early spring. It was in my eighth year; in the month of March, I afterward learned. At this age I knew but one language, and that was my mother's native tongue.

  Adam hired a part time person

Discussion (This is where you will address the Case Questions, using your own words in a discussion style, but supported by your references. Use suitable headings and sub-headings.

  Acquisition process, during the last decade

write a one page abstract describing a major program that has been managed, via the acquisition process, during the last decad

  Explain a plan for addressing the challenge

Describe a challenge or opportunity associated with improving public health in a selected region of the world and explain a plan for addressing the challenge or opportunity and how it will improve public health.

  Can you please explore the link between epistemology and

can you please explore the link between epistemology and scientific knowledge? why we need specific epistemology to be

  What motivates at work.

Write a 250 to 300 word paper using APA format about: 1. What you have learned about yourself and what motivates you at work. 2. What types of benefits you would offer your employees if you were an employer seeking to maximize your employee productiv..

  Is sexist language appropriate in single sex group?

Sexist language has been used for years. In our modern society it has been deemed socially unacceptable. Is sexist language appropriate in single sex group?

  Summarize the assignment into one page paper

Why are inert pills suddenly overwhelming promising new drugs and established medicines alike? The reasons are only just beginning to be understood.

  Business prevalent in the digital economy

Write a report on a business prevalent in the Digital Economy. The business can be Australian or International, and should have a Web presence. Examples of relevant businesses include; Facebook, Alibaba, IBM, e-Bay etc. Each team nominates three diff..

  Positive externalities of wind farm tax incentives in us

2 page of positive externalities of wind farm tax incentives in US. (Scholarly source based)

  Paper on challenge of training international civilian police

Write a research paper about Challenges of Training International Civilian Police. Your paper assignment will explore and develop the research question you proposed and that had been approved by the professor.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd