Write a cyber paper on communication vulnerability to attack

Assignment Help Term Paper
Reference no: EM131132023

Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.

A practical research paper takes in account a real-world cyber issue that affects business, government, or industry and takes a holistic approach to the issue.

Thesis type paper will be APA formatted, and consist of 40-45 pages.

Paper Outline

1. Introduction: Thesis: Diverse and appropriate methods that can be applied to increase thesecurity of space-based networks owned by the United States Department of Defense.

• Statement of the Problem: Thespace-based systems are vulnerable to attacks fromadversaries. Successful attacks can pose detrimental effects to the nation. These effects may leave the nation vulnerable to attacks and expose its confidential data to rivals and competitors (Adams, 2001).

• Scope: Details two different perspectives on vulnerability; Direct Threats to the United States space systems and threats to the United States Military forces (Spacy, 1999).

• Methodology: The research will make use of

• Object tracking and identification measures

• Optical tracking and imaging systems

• Radar tracking and imaging systems to assess the effectiveness of the proposed methods in increasing security of space-based networks.

• Theoretical Framework:Details the current situation of the communication systems of the State Department. It then gives a comprehensive report of potential harm that may be inflicted on the nation as well as the department in the event of a successful attack. It then details theoutcome of applying measures to increase thesecurity of space-based networks (Peña and Hudgins, 2002).

• Hypothesis: The section will detail anticipated outcomefrom the application of the proposed methods to improve thesecurity of the space-based communication systems.

• Review of Literature: The section will highlight previously highlighted literature on the topic. It will detail measures placed on the protection of the systems as published in theprevious literature. It will also point out loopholes within these measures published in theliterature. It will highlight previously published recommendation on safeguarding the communication systems pointing out instances of failure and success.

• Limitations of the Study: The research will point out that insufficient resources and analysis apparatus to be used in the research methodology. For instance, testing using object tracking and identification measures to ascertain a loophole and eventually come up with a solution to mitigate it (Peña and Hudgins, 2002).

• The significance of the Study: The section will highlight the importance of the study ofthe nation and the military defense forces. It will highlight that the provision of appropriate methods will be instrumental is safeguarding the nation's interests as well as addressing security concerns (Tellis, 2007).

2. Body

• Background of the Study: This section will detail instances in which the departments' communication systems have been vulnerable to attack. It will detail each occasion giving the date and source of theattack. It will also give accounts of the level of the breach; whether it was fruitful or not. Also, it will point out designs employed by the attackers in committing the attack, in conclusion, it will point out gaps that the attackers took advantage of (MacDonald, 2008).

• Presentation of Prevention Methods: The section will give three recommended methods to be used in safeguarding the United States Department of Defense space-based communication systems. The methods were arrived at based on the methodology applied to seal gaps in the communication systems(MacDonald, 2008). The three methods will include:

- The use of Counter Space Denial and Deception,
- The use of Electronic Attacks on communication, data and command links
- The use of Standoff Weapons

• The impact of Counter Space Operations: This section will detail potential implications of the application of the countermeasures that deal with attacks that bank on the vulnerability of the counter system. It will highlight that some of the measures applied may be subject to retaliation in the event they cause substantial harm to the attacker resources (Phillips and Swiler, 1998).

3. Conclusion

The research will end by acknowledging the importance of having measures to protect the department from external attack. It will also highlight instances where agencies failed to implement strategies to safeguard systems and their consequences.

Reference no: EM131132023

Questions Cloud

The stockholders equity section at year end : At the end of its first year of operation, Dade Corporation has $1,000,000 of common stock and net income of $216,000. Prepare
Find the articulation points in a graph : Find the articulation points in a graph. A vertex in an undirected connected graph is an articulation point (or cut vertex) iff removing it (and edges through it) disconnects the graph.
Renaissance style and mannerism in 16th century italy : Write an assignment on dramatic contrast between Renaissance style and Mannerism in 16th century Italy.-The essay consists of a style comparison between Raphael's Small Cowper Madonna and Parmigianino's Madonna with the Long Neck.
Do you agree that corporate managers would manipulate : Do you agree that corporate managers would manipulate their stock’s value prior to a buyback or do you believe that corporations are more likely to initiate a buyback to enhance shareholder value?
Write a cyber paper on communication vulnerability to attack : Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.
There is no journal entry to record the authorization : The relative lack of government regulation is an advantage of the corporate form of business.
Find the minimum number of dice : Find the minimum number of dice throws required to reach the destination or last cell from source or 1st cell.
Does cooperation require equal resources from all partners : From your research, discuss specific ideas or concepts regarding what proactive role can the HR department serve in helping the C-suite think about balancing competition and cooperation?
Which dividend policy would you recommend : Analyze each of the three dividend policies in light of GAC's financial position. Which dividend policy would you recommend? Justify your recommendation. What are the key factors to consider when setting the amount of a firm's initial annual dividend..

Reviews

Write a Review

Term Paper Questions & Answers

  Generation and evaluation of alternative solutions

Write two pages for "Generation and Evaluation of Alternative Solutions" for Love Canal case. Total 2 Pages for "Generation and Evaluation of Alternative Solutions" for love canal case and including references.

  Paper on deming theory

Paper on Deming theory: Dr. W. Edwards Deming developed a method for the quality improvement process. He believed that the identification and correction of defects after production is not effective.

  Paper on what does autism play in savant syndrome

Write a Paper on Topic:   What does autism play in savant syndrome?

  Write a paper on italy and its democracy

Write a Paper on Topic:  Italy and Its Democracy,  Affecting the Event by “The Economist” and  Democracy Appear to Work with including references.

  Climate change and the north

The essay topic is: Climate Change and the North (with particular Focus on the Inuit).  The purpose of this research paper is to help you engage with current events and contemporary challenges concerning Aboriginal people in Canada.

  Should manitoba adopt a single transferable vote

Write a paper on Topic: Should Manitoba adopt a single transferable vote (STV) electoral system for provincial elections?

  In crisis and reform

In Crisis and Reform:  Current Issues in American Punishment (p. 126), Alexis Durham writes,Please write a reaction paper (4-6 pages in length) to the quote in which you explore global correctional objectives

  Role play as the corporate social responsibility officer

Your Corporate Social Responsibility Officer  Handout and Rubric, This paper gives you an opportunity to "role play" as the Corporate Social Responsibility Officer for an organization of your choice.

  Operationalize sustainability

This assignment is designed for you to analyze an organization and to help develop a plan for that organization to better Operationalize sustainability in the future.

  Gulliver''s view of science

Write on  Gullivers view of science or politics, Jonathan Swift’s view about science is explicitly portrayed in this novel Gulliver’s travel. Jonathan swift says the scientific researches and the experiments will be utter waste of time and it will be..

  Designing a computer interface with visual disability

The topic is about designing a computer interface to people with visual disability (blindness- colour blindness) also , how to apply decision support systems to such interfaces..

  Social issue

Answer the following questions as these general questions pertain to the specific issue selected.The questions that you will cover with respect to your choice of broad social issue in the paper are given.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd