ITS 834 Emerging Threats and Countermeasures Total points – 100 Final Research Case Analysis The paper is due on end of day Sunday Dec 08, 2019 Topic: Implementing Cybersecurity in the Energy Sector Imagine you have been hired as a security consultant for EnergyA which is an electric utility company based in the USA. The company has several locations in the U.S and is responsible for supplying a large portion of electricity for the Southeastern region in the U.S. You have been charged with overseeing the implementation of cybersecurity best practices for EnergyA. In this course, you examined 10 design and security principles (Deception, Separation, Diversity, Commanlity, Depth, Discretion, Collection, Correlation, Awareness, Response) in the context of national and critical infrastructure protection. Identify any two security principles and evaluate and discuss how it can be applied to EnergyA. Your case analysis needs to minimally address the following The relevance of cybersecurity in the energy sector Existing research on cybersecurity practices in the energy sector Why you are focusing on the specific two security principles For each security principle, identify its relevance in the energy sector For each security principle, identify how the principle can be implemented For each security principle, identify challenges presented in implementing it Discussion that connects your entire analysis with the topic and future implications of cybersecurity in the energy sector Your research paper should be minimally 10 pages (double space, Font – Georgia with font size 12). The research paper needs cite at least 5 peer reviewed journal/book references. The bibliography should be included as a separate page and is not part of the 10 page requirement. Student assignments will be run through Safe Assignment. Please ensure to check the safe assignment result prior to submitting. You will have the chance to submit your assignment up to two times. So please submit earlier than the due date so you can check your safe assign score. You need to check your safe assign report to ensure there is no instance of academic integrity violations. Please refer to this link for information on the academic integrity policy at the university https://cumberland.smartcatalogiq.com/en/2017-2018/2017-2018-UndergraduateCatalog/Academic-Affairs/Academic-Integrity-Policy Please ensure to review the policy. If there are instances of academic integrity policy violations in your paper, you will not receive a grade for the assignment and will be referred to the department. The university of Cumberland library can be assessed at https://www.ucumberlands.edu/library The research paper should include the following components. Title Page (Not part of the minimum 10 page requirement) Abstract (quick overview in your own words of the entire content of your paper, limited to 200-350 words) Introduction (1-2 pages, relevance of cybersecurity in the energy sector) Literature Review (2-4 pages, describes the research papers that you find in reference to the topic of cybersecurity in the energy sector)’ Cybersecurity Implementation (2-4 pages, Why you are focusing on the two specific security principles; For each security principle, identify its relevance in the energy sector; For each security principle, identify how the principle can be implemented; For each security principle, identify challenges presented in implementing it) Discussion (2-3 pages) – (Your perspectives on the topic, try to connect the security principles identified together; discuss future implications of cybersecurity in the energy sector) Conclusion (1-2 paragraphs, This provides a final summary of your research paper) Bibliography in APA format The following rubric will be used to grade your assessment Evaluation Parameters Percentage Weight Did the student respond to the research topic 20 Did the student conduct sufficient literature review of the topic 20 Did the student provide relevant examples to support viewpoints 20 Did the student meet the content requirements of the assignment and discuss the key points identified in the question 20 Did the student provide a critical perspective on the topic 10 Did the student create a professional, well-developed report with proper grammar, spelling, punctuation and APA formatting 10 Total 100% Please refer to the following for APA guidelines https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_st yle_guide/general_format.html
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more