Cybersecurity research papersummary:

Assignment Help Basic Computer Science
Reference no: EM13806318

Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Your research is to be incorporated into a three to five page written analysis of the attack or incident. Your analysis must be supported by five or more authoritative sources which you cite using APA formatted in-text citations and references (in your reference list). Your paper for this assignment must be submitted to your instructor's TurnItIn section for Originality Checking.

Detailed Assignment Description:Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

  • For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.

Pre-approved topics include

  • Adobe Source Code & Customer Data hacked (2013)
  • APT1 (see Mandiant report of People's Liberation Army cyberattacks)
  • Cryptolocker Ransomware (2013)
  • DigiNotar Certificate Theft / Compromise (detected in 2011)
  • HomeDepot data breach (2014)
  • Operation High Roller (detected in 2012)
  • Gameover ZeuS botnet (countered by Operation Tovar; made public in 2014)
  • RSA SecurID breach (2011)
  • Target data breach (2013/2014)
  • Telephone Tech Support Scam (2014) see https://www.ic3.gov/media/2014/141113.aspx

You may propose an alternate topic for your instructor's approval. Approval is NOT guaranteed. Your request for approval should be posted as a message in the Ask Your Instructor conference.

1. Short Topic Name

2. URL for news article about the security incident or attack that you will research for your paper

3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.

Ideas for additional topics can be found on various security-related websites, including

  • ID Theft Resource Center (2014 Data Breach Reporthttps://www.idtheftcenter.org
  • Bruce Schneier on Security https://www.schneier.com/blog/
  • Carnegie-Mellon CERT: https://www.cert.org/insider_threat/study.html
  • CSO Onlinehttps://www.csoonline.com/
  • Data Breach Today https://www.databreachtoday.com
  • SC Magazinehttps://www.scmagazine.com/
  • Symantec: https://www.symantec.com/threatreport/
  • US-CERT: https://www.us-cert.gov/security-publications/#reports

After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:

  • identifying the type of breach
  • identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
  • identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
  • identifying and discussing technological improvements that would help prevent recurrence

Formatting Requirements: use the Basic APA format paper template found under Content > Course Documents > APA Resources. See style gallery for styles that will give you the required paragraph and headings formatting. Your file must have a separate title page and separate reference page.Sample CSIA Research Paper: Consult the sample CSIA paper provided under Content > Course Documents > APA Resources.

Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM13806318

Questions Cloud

Well-publicized report from it analyst firm gartner : In 2003, a well-publicized report from IT analyst firm Gartner predicted that the market for stand-alone IDS tools would soon disappear, and urged Gartner clients to cease investing in IDS tools in favor of firewalls. Clearly, the obsolescence of IDS..
Problem related to the good leadership : Good leadership is important for quality improvement processes, customer relationships, employee retention, and overall organizational processes.
Compare and contrast organized criminal organizations : Compare and contrast organized criminal organizations and international terrorist organizations in terms of ideological drivers and overall objectives. Why are these distinctions significant
Cybersecurity research papersummary: : Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from governme..
Discuss competition within intermodal transportation : Discuss competition within intermodal transportation. Points of discussion may include strategies, the impact of regulation/deregulation, competition between the various modes of transport, safety, rates, supply and demand, port ownership, equipme..
About teacher perceptions and expectations : Teacher Perceptions and Expectations
Why is it often difficult to organize collective action : What are public goods, and why is it often difficult to organize collective action to achieve them
Write a perl program that given a dna string : Write a Perl program that given a DNA string, prints out the 20 characters upstream of the start codon ATG

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the frequency of failure

Collect Experimental Data. Bend the provided 30 paper clips until they fail.

  Shoppingbay is an online auction service

ShoppingBay is an online auction service that requires several reports. Design a flowchart or psuedocode [this is changed to Java program, since this is an old assignment we're doing for practice in Java] for the following: a. A program..

  Writing quality and formal structure of the paper

Writing Quality and formal structure of the paper

  Write down differences in company policies of firm

For Firm ABC, each of the relations is in 3NF. Write down two differences should exist in company policies of Firm ABC? Explain your answer.

  Location to be available in the new los angeles office

Network engineer for a small company with one local office in New York City. The company has been experiencing tremendous growth in the northeastern United States. As a result of this unprecedented growth, the company's management decides to es..

  Write an overload function

Write an overload function named printlin() which display its argument followed by a new line. This function will output the following data types: string, boolean, and int.

  Views in sql on the company database schema

Specify the following views in SQL on the COMPANY database schema

  Critically analyze the transmission media

Critically analyze the transmission media you would recommend for each different building and department of the medical instrument company

  Operational analysis and quality improvement

Operational Analysis and Quality Improvement- Consider Kotter's eight-stage model of change (Table 2-1). How does it compare to Berwick's rules of the diffusion of innovation

  Design a program that will allow a user to input a list

Design a program that will allow a user to Input a list of your married male friends name (first and last name) along with their weight and first name of their spouse.

  Which three editions vista allow to join domain on network

Which three editions of Vista allow you to join a domain on a network

  Which particular software products are used at your company

Which particular software products are used at your company?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd