Cyber security Research Paper
******I WILL PROVIDE AN EXAMPLE RESEARCH PAPER******
Summary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Your research is to be incorporated into a three to five page written analysis of the attack or incident. Your analysis must be supported by five or more authoritative sources which you cite using APA formatted in-text citations and references (in your reference list)
Detailed Assignment Description:
Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.
• For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.
.PLEASE TRY TO KEEP IT AT 3 PAGES FULL OF WORDS
Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.
• HomeDepot data breach (2014)
After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:
• identifying the type of breach
• identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
• identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
• identifying and discussing technological improvements that would help prevent
Formatting Requirements: use the Basic APA format paper template found under Content > Course Documents > APA Resources. See style gallery for styles that will give you the required paragraph and headings formatting. Your file must have a separate title page and separate reference page.
Sample CSIA Research Paper: Consult the sample CSIA paper provided under Content > Course Documents > APA Resources.
Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment.
Cybersecurity Research Paper
Read the list of suggested resources to find URLs for news stories and reports for your chosen topic. Then find 5 sources on your own. Each source MUST be authoritative and/or scholarly. If you are unsure of what this means, read the Library’s Research Guides at http://www.umuc.edu/library/libhow/webresources.cfm and http://www.umuc.edu/library/libhow/articles.cfm
Here are two scholarly resources that must be use:
http://www.prnewswire.com/news-releases/the-home-depot-reports-findings-in-payment-data-breach-investigation-281830571.html
http://resources.infosecinstitute.com/insider-vs-outsider-threats-identify-and-prevent/
Review your selected resources to make sure that you have at least one article or paper that provides an answer for each of the major content items for your research paper:
Grading Rubric
identifying the type of breach- Completely and thoroughly introduces the security incident or attack using the 5W formula (who, what, when, where, why). Discussion clearly identifies and briefly summarizes the attack, the attackers, and the information, information systems, and networks which were attacked (includes identification of victims).
identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)- ompletely and thoroughly discusses how the attack or security breach occurred or the suspected means / methods used by the attackers. Paper includes a separate major section which addresses the means and methods used in the attack. Addresses specific exploits or tools used in the attack or the suspected means / methods used by attackers. Discussion identifies and provides an assessment of security controls which were ineffective. Discussion addresses specific known or suspected vulnerabilities which were exploited by the attackers.
identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems-The research paper contains a separate and thorough discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (All five characteristics are defined, discussed, and analyzed.)
identifying and discussing technological improvements that would help prevent recurrence- The paper includes a section devoted to discussing technology improvements which could have prevented, detected, and deterred the attack. Discussion addresses technology improvements in security controls and vulnerability identification / remediation. The discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).
Last Completed Projects
| topic title | academic level | Writer | delivered |
|---|
jQuery(document).ready(function($) { var currentPage = 1; // Initialize current page
function reloadLatestPosts() { // Perform AJAX request $.ajax({ url: lpr_ajax.ajax_url, type: 'post', data: { action: 'lpr_get_latest_posts', paged: currentPage // Send current page number to server }, success: function(response) { // Clear existing content of the container $('#lpr-posts-container').empty();
// Append new posts and fade in $('#lpr-posts-container').append(response).hide().fadeIn('slow');
// Increment current page for next pagination currentPage++; }, error: function(xhr, status, error) { console.error('AJAX request error:', error); } }); }
// Initially load latest posts reloadLatestPosts();
// Example of subsequent reloads setInterval(function() { reloadLatestPosts(); }, 7000); // Reload every 7 seconds });

