Cybersecurity Research Paper (1 @ 15 points; 15 percent overall)
Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.
For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.
For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.
For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.
Your research is to be incorporated into the students’ 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using basic APA formatting (see below) and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your Web Tycho assignments folder.
Pre-approved topics include
Stuxnet virus
ChoicePoint data breach
T.J. Maxx data breach
Operation Aurora
Operation Shady RAT
RSA SecurID breach
China-related attack(s) against Google’s corporate infrastructure
Operation High Roller
FinFisher attacks on activists (suppression of political dissent)
You may propose an alternate topic for your instructor’s approval. Approval is NOT guaranteed. Your request for approval (posted as a reply to the message in the Week 2 conference) must contain the following information:
1. Short Topic Name
2. URL for news article about the security incident or attack that you will research for your paper
3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.
Ideas for additional topics can be found on various security-related websites, including
Bruce Schneier on Security HYPERLINK “http://www.schneier.com/blog/” http://www.schneier.com/blog/
Carnegie-Mellon CERT: HYPERLINK “http://www.cert.org/insider_threat/study.html” http://www.cert.org/insider_threat/study.html
CSO Online: HYPERLINK “http://www.csoonline.com/” http://www.csoonline.com/
SC Magazine: HYPERLINK “http://www.scmagazine.com/” http://www.scmagazine.com/
Symantec: HYPERLINK “http://www.symantec.com/threatreport/” http://www.symantec.com/threatreport/
US-CERT: HYPERLINK “http://www.us-cert.gov/security-publications/” l “reports” http://www.us-cert.gov/security-publications/#reports
After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:
identifying the type of breach
identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
identifying and discussing technological improvements that would help prevent recurrence
Grading Rubric
Organization and presentation of content: 40%
Analysis and critical thinking: 20%
Selection (appropriateness) and citing of sources: 20%
Professionalism (writing style and grammar/spelling/punctuation): 20%
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more