Write a cyber paper about the united states department of


Write a Cyber Paper about The United States Department of Defense Space-Based Communications Vulnerability to Attack.

A practical research paper takes in account a real-world cyber issue that affects business, government, or industry and takes a holistic approach to the issue.

Thesis type paper will be APA formatted, and consist of 40-45 pages.

Paper Outline

1. Introduction: Thesis: Diverse and appropriate methods that can be applied to increase thesecurity of space-based networks owned by the United States Department of Defense.

• Statement of the Problem: Thespace-based systems are vulnerable to attacks fromadversaries. Successful attacks can pose detrimental effects to the nation. These effects may leave the nation vulnerable to attacks and expose its confidential data to rivals and competitors (Adams, 2001).

• Scope: Details two different perspectives on vulnerability; Direct Threats to the United States space systems and threats to the United States Military forces (Spacy, 1999).

• Methodology: The research will make use of

• Object tracking and identification measures

• Optical tracking and imaging systems

• Radar tracking and imaging systems to assess the effectiveness of the proposed methods in increasing security of space-based networks.

• Theoretical Framework:Details the current situation of the communication systems of the State Department. It then gives a comprehensive report of potential harm that may be inflicted on the nation as well as the department in the event of a successful attack. It then details theoutcome of applying measures to increase thesecurity of space-based networks (Peña and Hudgins, 2002).

• Hypothesis: The section will detail anticipated outcomefrom the application of the proposed methods to improve thesecurity of the space-based communication systems.

• Review of Literature: The section will highlight previously highlighted literature on the topic. It will detail measures placed on the protection of the systems as published in theprevious literature. It will also point out loopholes within these measures published in theliterature. It will highlight previously published recommendation on safeguarding the communication systems pointing out instances of failure and success.

• Limitations of the Study: The research will point out that insufficient resources and analysis apparatus to be used in the research methodology. For instance, testing using object tracking and identification measures to ascertain a loophole and eventually come up with a solution to mitigate it (Peña and Hudgins, 2002).

• The significance of the Study: The section will highlight the importance of the study ofthe nation and the military defense forces. It will highlight that the provision of appropriate methods will be instrumental is safeguarding the nation's interests as well as addressing security concerns (Tellis, 2007).

2. Body

• Background of the Study: This section will detail instances in which the departments' communication systems have been vulnerable to attack. It will detail each occasion giving the date and source of theattack. It will also give accounts of the level of the breach; whether it was fruitful or not. Also, it will point out designs employed by the attackers in committing the attack, in conclusion, it will point out gaps that the attackers took advantage of (MacDonald, 2008).

• Presentation of Prevention Methods: The section will give three recommended methods to be used in safeguarding the United States Department of Defense space-based communication systems. The methods were arrived at based on the methodology applied to seal gaps in the communication systems(MacDonald, 2008). The three methods will include:

- The use of Counter Space Denial and Deception,
- The use of Electronic Attacks on communication, data and command links
- The use of Standoff Weapons

• The impact of Counter Space Operations: This section will detail potential implications of the application of the countermeasures that deal with attacks that bank on the vulnerability of the counter system. It will highlight that some of the measures applied may be subject to retaliation in the event they cause substantial harm to the attacker resources (Phillips and Swiler, 1998).

3. Conclusion

The research will end by acknowledging the importance of having measures to protect the department from external attack. It will also highlight instances where agencies failed to implement strategies to safeguard systems and their consequences.

Solution Preview :

Prepared by a verified Expert
Essay Writing: Write a cyber paper about the united states department of
Reference No:- TGS01516397

Now Priced at $250 (50% Discount)

Recommended (95%)

Rated (4.7/5)