Write a cyber paper on communication vulnerability to attack

Assignment Help Term Paper
Reference no: EM131132023

Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.

A practical research paper takes in account a real-world cyber issue that affects business, government, or industry and takes a holistic approach to the issue.

Thesis type paper will be APA formatted, and consist of 40-45 pages.

Paper Outline

1. Introduction: Thesis: Diverse and appropriate methods that can be applied to increase thesecurity of space-based networks owned by the United States Department of Defense.

• Statement of the Problem: Thespace-based systems are vulnerable to attacks fromadversaries. Successful attacks can pose detrimental effects to the nation. These effects may leave the nation vulnerable to attacks and expose its confidential data to rivals and competitors (Adams, 2001).

• Scope: Details two different perspectives on vulnerability; Direct Threats to the United States space systems and threats to the United States Military forces (Spacy, 1999).

• Methodology: The research will make use of

• Object tracking and identification measures

• Optical tracking and imaging systems

• Radar tracking and imaging systems to assess the effectiveness of the proposed methods in increasing security of space-based networks.

• Theoretical Framework:Details the current situation of the communication systems of the State Department. It then gives a comprehensive report of potential harm that may be inflicted on the nation as well as the department in the event of a successful attack. It then details theoutcome of applying measures to increase thesecurity of space-based networks (Peña and Hudgins, 2002).

• Hypothesis: The section will detail anticipated outcomefrom the application of the proposed methods to improve thesecurity of the space-based communication systems.

• Review of Literature: The section will highlight previously highlighted literature on the topic. It will detail measures placed on the protection of the systems as published in theprevious literature. It will also point out loopholes within these measures published in theliterature. It will highlight previously published recommendation on safeguarding the communication systems pointing out instances of failure and success.

• Limitations of the Study: The research will point out that insufficient resources and analysis apparatus to be used in the research methodology. For instance, testing using object tracking and identification measures to ascertain a loophole and eventually come up with a solution to mitigate it (Peña and Hudgins, 2002).

• The significance of the Study: The section will highlight the importance of the study ofthe nation and the military defense forces. It will highlight that the provision of appropriate methods will be instrumental is safeguarding the nation's interests as well as addressing security concerns (Tellis, 2007).

2. Body

• Background of the Study: This section will detail instances in which the departments' communication systems have been vulnerable to attack. It will detail each occasion giving the date and source of theattack. It will also give accounts of the level of the breach; whether it was fruitful or not. Also, it will point out designs employed by the attackers in committing the attack, in conclusion, it will point out gaps that the attackers took advantage of (MacDonald, 2008).

• Presentation of Prevention Methods: The section will give three recommended methods to be used in safeguarding the United States Department of Defense space-based communication systems. The methods were arrived at based on the methodology applied to seal gaps in the communication systems(MacDonald, 2008). The three methods will include:

- The use of Counter Space Denial and Deception,
- The use of Electronic Attacks on communication, data and command links
- The use of Standoff Weapons

• The impact of Counter Space Operations: This section will detail potential implications of the application of the countermeasures that deal with attacks that bank on the vulnerability of the counter system. It will highlight that some of the measures applied may be subject to retaliation in the event they cause substantial harm to the attacker resources (Phillips and Swiler, 1998).

3. Conclusion

The research will end by acknowledging the importance of having measures to protect the department from external attack. It will also highlight instances where agencies failed to implement strategies to safeguard systems and their consequences.

Reference no: EM131132023

Questions Cloud

The stockholders equity section at year end : At the end of its first year of operation, Dade Corporation has $1,000,000 of common stock and net income of $216,000. Prepare
Find the articulation points in a graph : Find the articulation points in a graph. A vertex in an undirected connected graph is an articulation point (or cut vertex) iff removing it (and edges through it) disconnects the graph.
Renaissance style and mannerism in 16th century italy : Write an assignment on dramatic contrast between Renaissance style and Mannerism in 16th century Italy.-The essay consists of a style comparison between Raphael's Small Cowper Madonna and Parmigianino's Madonna with the Long Neck.
Do you agree that corporate managers would manipulate : Do you agree that corporate managers would manipulate their stock’s value prior to a buyback or do you believe that corporations are more likely to initiate a buyback to enhance shareholder value?
Write a cyber paper on communication vulnerability to attack : Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.
There is no journal entry to record the authorization : The relative lack of government regulation is an advantage of the corporate form of business.
Find the minimum number of dice : Find the minimum number of dice throws required to reach the destination or last cell from source or 1st cell.
Does cooperation require equal resources from all partners : From your research, discuss specific ideas or concepts regarding what proactive role can the HR department serve in helping the C-suite think about balancing competition and cooperation?
Which dividend policy would you recommend : Analyze each of the three dividend policies in light of GAC's financial position. Which dividend policy would you recommend? Justify your recommendation. What are the key factors to consider when setting the amount of a firm's initial annual dividend..

Reviews

Write a Review

Term Paper Questions & Answers

  Importance of recognizing the signs of stalking

Importance of recognizing the signs of stalking and criminal definition of stalking for your jurisdiction (cite a relevant stalking statute)

  Internet and telecommunication and new effects

Internet and Telecommunication and New Effects. The aim of this paper is to explore the issue of Voice over Internet Protocol (VoIP) , Focus on Section: Abstract / Introduction / Section(s): Detailed Study / Section: Reference

  Find a speech to analyze

Find a speech to analyze. It can be a speech by any person, from any time period. It can be taken from a textual printing of the speech (as one would find in a book), an audio or visual recording, or a live, in-person observation.

  How the environment promotes quality of life for residents

Outline the major strengths and weaknesses with respect to how the environment promotes quality of life for residents.

  Does the company use the derivatives

Write 5 pages paper ( single space, Times New Roman, 12-point font size) about shell company and does the company use the derivatives and what kind of benefit doest company gets from it.

  Write a paper on sunk cost

submit a five page double spaced paper on sunk cost.

  Integration of quality cost to economic service life

The machine seems to be deteriorated and it may not function exactly well. It may result in customer dissatisfaction and quality cost. This paper deals with the determination of economic service life when considering quality cost

  Competing visions the federalists and republicans

Characterize the competing visions the Federalists and republicans had for the country during the 1790s.

  Career development

Reflecting on what strategies you will implement in terms of your career development

  Conclusion on writing a guide on the writing process

an introduction and conclusion on writing a guide on the writing process

  Term paper on macro systems

Prepare a term paper on "Macro Systems"

  The case study

The case study simulates a project management scenario where the student takes on the role of project manager. The case information is not complete so where necessary students will have to make assumptions and argue the pros and cons for any recommen..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd