Cybersecurity research papersummary after selecting a topic


Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Your research is to be incorporated into a three to five page written analysis of the attack or incident. Your analysis must be supported by five or more authoritative sources which you cite using APA formatted in-text citations and references (in your reference list). Your paper for this assignment must be submitted to your instructor's TurnItIn section for Originality Checking.

Detailed Assignment Description:Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

  • For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.
  • For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.

Pre-approved topics include

  • Adobe Source Code & Customer Data hacked (2013)
  • APT1 (see Mandiant report of People's Liberation Army cyberattacks)
  • Cryptolocker Ransomware (2013)
  • DigiNotar Certificate Theft / Compromise (detected in 2011)
  • HomeDepot data breach (2014)
  • Operation High Roller (detected in 2012)
  • Gameover ZeuS botnet (countered by Operation Tovar; made public in 2014)
  • RSA SecurID breach (2011)
  • Target data breach (2013/2014)
  • Telephone Tech Support Scam (2014) see https://www.ic3.gov/media/2014/141113.aspx

You may propose an alternate topic for your instructor's approval. Approval is NOT guaranteed. Your request for approval should be posted as a message in the Ask Your Instructor conference.

1. Short Topic Name

2. URL for news article about the security incident or attack that you will research for your paper

3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.

Ideas for additional topics can be found on various security-related websites, including

  • ID Theft Resource Center (2014 Data Breach Reporthttps://www.idtheftcenter.org
  • Bruce Schneier on Security https://www.schneier.com/blog/
  • Carnegie-Mellon CERT: https://www.cert.org/insider_threat/study.html
  • CSO Onlinehttps://www.csoonline.com/
  • Data Breach Today https://www.databreachtoday.com
  • SC Magazinehttps://www.scmagazine.com/
  • Symantec: https://www.symantec.com/threatreport/
  • US-CERT: https://www.us-cert.gov/security-publications/#reports

After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:

  • identifying the type of breach
  • identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
  • identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
  • identifying and discussing technological improvements that would help prevent recurrence

Formatting Requirements: use the Basic APA format paper template found under Content > Course Documents > APA Resources. See style gallery for styles that will give you the required paragraph and headings formatting. Your file must have a separate title page and separate reference page.Sample CSIA Research Paper: Consult the sample CSIA paper provided under Content > Course Documents > APA Resources.

Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Cybersecurity research papersummary after selecting a topic
Reference No:- TGS01086568

Expected delivery within 24 Hours