Reference no: EM133870962 , Length: word count:1500
Information Systems Security
Assessment - Research Paper
Task instructions
You are required to write an individual research paper on a contemporary issue in cybersecurity. This assessment allows you to explore a specific topic of interest, conduct a literature review, apply critical analysis, and demonstrate your understanding of key cybersecurity models or practices.
This task builds your ability to:
- Investigate a real-world cybersecurity problem or threat.
- Conduct a structured literature review.
- Critically analyse existing knowledge and propose informed arguments or solutions.
- Demonstrate your academic writing and referencing skills.
Choose one topic from the list below (or propose your own with coordinator approval):
- A real-world cybersecurity incident or breach (e.g., Optus, SolarWinds, Medibank).
- An emerging threat or vulnerability (e.g., deepfakes, AI-driven phishing, quantum risks).
- A security paradigm or model (e.g., Zero Trust, NIST, CIA Triad).
- An issue related to data privacy, compliance or surveillance.
- A security flaw in software/system architecture and its mitigation.
- An ethical concern or legal challenge in cybersecurity.
Suggested Research Topics:
- Impact of the Medibank data breach on public trust
- Ransomware-as-a-Service: Emerging business models of cybercrime
- The role of AI in social engineering attacks
- Comparing GDPR and the Australian Privacy Act: Gaps and overlaps
- Effectiveness of Zero Trust Architecture in cloud-based systems
- Security risks of Bring Your Own Device (BYOD) policies
- Vulnerabilities in IoT devices and mitigation strategies
- Data privacy issues in health informatics systems
- Cybersecurity challenges in smart cities infrastructure
- Machine learning for intrusion detection systems
- Blockchain as a cybersecurity solution: Myth or reality?
- Threat modelling in critical infrastructure systems
- Evaluating the NIST cybersecurity framework in SMEs
- Ethical implications of facial recognition technologies
- Cybersecurity policy development in higher education
- Cybersecurity awareness training: Does it really work?
- Forensic analysis of malware attacks in enterprise networks
- Social media data leaks: A growing risk for businesses
- Comparative study of phishing detection tools
- Securing remote work environments post-COVID
Summary and Purpose of Assessment
This assessment is designed to help you demonstrate your research skills, explore a cybersecurity challenge in depth, and present your analysis in a formal research paper. You will analyse existing literature, apply cybersecurity models and tools, and draw informed conclusions relevant to industry and practice.
Assessment Instructions
Title Page - Include your paper title, name, student ID, and unit details.
Abstract (150-200 words) -
What the paper is about
Why this topic is important
Your methodology (e.g., literature review)
Key findings or insights.
Introduction (250-300 words)
Define the topic and scope of your research.
Explain why this issue is significant in the cybersecurity field.
State your research question or objective.
Literature Review (400-450 words)
Present 8-10 academic sources (peer-reviewed or industry whitepapers).
Identify:
Major findings
Conflicting viewpoints
Trends or gaps in the research
Group ideas thematically (e.g., attack methods, impact, countermeasures).
Critical Analysis & Discussion (300-400 words)
Evaluate:
Which approaches/models/tools are most effective or flawed?
What can be done differently in practice?
Link theory to real-world application.
Include at least one framework or model from the unit (e.g., NIST, threat modeling).
Conclusion (100-200 words)
Summarize key insights.
Discuss implications for future research or cybersecurity professionals.
Reflect on the importance of addressing the issue.
References - Use Holmes Adapted Harvard Style (minimum 10 scholarly references). Ensure no fake or incomplete citations.
Harvard Referencing Style.