Cybersecurity research papersummary:

Assignment Help Basic Computer Science
Reference no: EM13806318

Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Your research is to be incorporated into a three to five page written analysis of the attack or incident. Your analysis must be supported by five or more authoritative sources which you cite using APA formatted in-text citations and references (in your reference list). Your paper for this assignment must be submitted to your instructor's TurnItIn section for Originality Checking.

Detailed Assignment Description:Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

  • For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.

Pre-approved topics include

  • Adobe Source Code & Customer Data hacked (2013)
  • APT1 (see Mandiant report of People's Liberation Army cyberattacks)
  • Cryptolocker Ransomware (2013)
  • DigiNotar Certificate Theft / Compromise (detected in 2011)
  • HomeDepot data breach (2014)
  • Operation High Roller (detected in 2012)
  • Gameover ZeuS botnet (countered by Operation Tovar; made public in 2014)
  • RSA SecurID breach (2011)
  • Target data breach (2013/2014)
  • Telephone Tech Support Scam (2014) see https://www.ic3.gov/media/2014/141113.aspx

You may propose an alternate topic for your instructor's approval. Approval is NOT guaranteed. Your request for approval should be posted as a message in the Ask Your Instructor conference.

1. Short Topic Name

2. URL for news article about the security incident or attack that you will research for your paper

3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.

Ideas for additional topics can be found on various security-related websites, including

  • ID Theft Resource Center (2014 Data Breach Reporthttps://www.idtheftcenter.org
  • Bruce Schneier on Security https://www.schneier.com/blog/
  • Carnegie-Mellon CERT: https://www.cert.org/insider_threat/study.html
  • CSO Onlinehttps://www.csoonline.com/
  • Data Breach Today https://www.databreachtoday.com
  • SC Magazinehttps://www.scmagazine.com/
  • Symantec: https://www.symantec.com/threatreport/
  • US-CERT: https://www.us-cert.gov/security-publications/#reports

After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:

  • identifying the type of breach
  • identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
  • identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
  • identifying and discussing technological improvements that would help prevent recurrence

Formatting Requirements: use the Basic APA format paper template found under Content > Course Documents > APA Resources. See style gallery for styles that will give you the required paragraph and headings formatting. Your file must have a separate title page and separate reference page.Sample CSIA Research Paper: Consult the sample CSIA paper provided under Content > Course Documents > APA Resources.

Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM13806318

Questions Cloud

Well-publicized report from it analyst firm gartner : In 2003, a well-publicized report from IT analyst firm Gartner predicted that the market for stand-alone IDS tools would soon disappear, and urged Gartner clients to cease investing in IDS tools in favor of firewalls. Clearly, the obsolescence of IDS..
Problem related to the good leadership : Good leadership is important for quality improvement processes, customer relationships, employee retention, and overall organizational processes.
Compare and contrast organized criminal organizations : Compare and contrast organized criminal organizations and international terrorist organizations in terms of ideological drivers and overall objectives. Why are these distinctions significant
Cybersecurity research papersummary: : Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from governme..
Discuss competition within intermodal transportation : Discuss competition within intermodal transportation. Points of discussion may include strategies, the impact of regulation/deregulation, competition between the various modes of transport, safety, rates, supply and demand, port ownership, equipme..
About teacher perceptions and expectations : Teacher Perceptions and Expectations
Why is it often difficult to organize collective action : What are public goods, and why is it often difficult to organize collective action to achieve them
Write a perl program that given a dna string : Write a Perl program that given a DNA string, prints out the 20 characters upstream of the start codon ATG

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define the balance for some of the accounts

Define the balance for some of the accounts to be less than $500 and some to be more than $500. After you have created your accounts print your account list, then withdraw $500 from all accounts and redisplay your list.

  Software system architecture

Read the case study titled "A Patient Information System for Mental Health Care", located in Chapter 1 of your textbook. Develop an overall architecture for the system described in the assigned reading

  Values for the items in the risk register

Recommend reasonable values for items in risk register for this asset and threat, and give justifications for your choices.

  Explain vulnerability in the system

How would you respond if Goli came to you describing a vulnerability in your system and offering to help fix it--What would incline you to hire her? What would disincline you from doing so?

  System would achieve any better levels of forecast accuracy

How could you suggest that your new system would achieve any better levels of forecast accuracy. Why is forecast accuracy itself not as important under traditional methods

  Simple math quiz that asks a user

Construct a simple math quiz that asks a user to answer a math problem of your choice. On the form, place one text box (txtAnswer) and two command buttons (cmdAskQuestion and cmdVerifyAnswer).

  Write a program that will read in a length in meters

Write a program that will read in a length in meters and centimeters and output the equivalent length in feet and inches. Use at least three functions; one for input, one or more for calculating and one for output.

  A relational database model allows database users to analyze

"Relational Set Operators"Please respond to the following: A relational Database Model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as UNION and INTERSECT may be used.  Describe a business scenario wher..

  What type of address is stored in the source address field

What type of address is stored in the Source Address field of an Ethernet frame

  What you know about the three platform architectures

Based on what you know about the three platform architectures. iOS, Android, and Windows Phone 7, which one would you select to develop apps? Describe your answer.

  Draw an entity-relationship diagram

Draw an entity-relationship diagram that describes the following business environment.

  Intrusion detection systems

According to the textbook, Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) exa..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd