Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.Pre-approved topics includeAdobe Source Code & Customer Data hacked (2013)APT1 (see HYPERLINK "http://intelreport.mandiant.com/" Mandiant report of People’s Liberation Army cyberattacks)CryptolockerRansomware (2013)DigiNotar Certificate Theft / Compromise (detected in 2011)HomeDepotdata breach (2014)Operation High Roller (detected in 2012)GameoverZeuS botnet (countered by Operation Tovar; made public in 2014)RSA SecurID breach (2011)Target data breach (2013/2014)Telephone Tech Support Scam (2014) see HYPERLINK "http://www.ic3.gov/media/2014/141113.aspx" http://www.ic3.gov/media/2014/141113.aspxYou may propose an alternate topic for your instructor’s approval. Approval is NOT guaranteed. Your request for approval should be posted as a message in the Ask Your Instructor conference.1. Short Topic Name2. URL for news article about the security incident or attack that you will research for your paper3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.Ideas for additional topics can be found on various security-related websites, includingID Theft Resource Center ( HYPERLINK "http://www.idtheftcenter.org/images/breach/DataBreachReports_2014.pdf" 2014 Data Breach Report) HYPERLINK "http://www.idtheftcenter.org" http://www.idtheftcenter.orgBruce Schneier on Security HYPERLINK "http://www.schneier.com/blog/" http://www.schneier.com/blog/Carnegie-Mellon CERT: HYPERLINK "http://www.cert.org/insider_threat/study.html" http://www.cert.org/insider_threat/study.htmlCSO Online: HYPERLINK "http://www.csoonline.com/" http://www.csoonline.com/Data Breach Today HYPERLINK "http://www.databreachtoday.com" http://www.databreachtoday.comSC Magazine: HYPERLINK "http://www.scmagazine.com/" http://www.scmagazine.com/Symantec: HYPERLINK "http://www.symantec.com/threatreport/" http://www.symantec.com/threatreport/US-CERT: HYPERLINK "http://www.us-cert.gov/security-publications/" \l "reports" http://www.us-cert.gov/security-publications/#reportsAfter you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:identifying the type of breachidentifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systemsidentifying and discussing technological improvements that would help prevent recurrenceGrading Rubric: the detailed rubric is attached to the assignment folder entry for this paper.Rubric Name: Research Paper RubricCriteriaLevel 6Level 5Level 4Level 3Level 2Level 1Identifies and Introduces the Attack or Breach (20%)20 pointsCompletely and thoroughly introduces the security incident or attack using the 5W formula (who, what, when, where, why). Discussion clearly identifies and briefly summarizes the attack, the attackers, and the information, information systems, and networks which were attacked (includes identification of victims).18 pointsIntroduces the security incident or attack using the 5W formula (who, what, when, where, why, and how). Discussion clearly identifies and briefly summarizes the attack, the attackers, and the information, information systems, and networks which were attacked (includes identification of victims).16 pointsIntroduces the security incident or attack using the 5W formula (who, what, when, where, why, and how). Discussion mentions the attack, the attackers, and the targets (victims).14 pointsIntroduces the attack, the attackers, and the victims. Uses at least three of the criteria from the 5W formula (who, what, when, where, why, and how).10 pointsIntroduces the attack, the attackers, and the victims. Provides some information about where and when.0 pointsResearch paper does not have an identifiable introduction that provides information about the attack, the attackers, and/or the victims.Means & Methods Used in the Attack (20%)20 pointsCompletely and thoroughly discusses how the attack or security breach occurred or the suspected means / methods used by the attackers. Paper includes a separate major section which addresses the means and methods used in the attack. Addresses specific exploits or tools used in the attack or the suspected means / methods used by attackers. Discussion identifies and provides an assessment of security controls which were ineffective. Discussion addresses specific known or suspected vulnerabilities which were exploited by the attackers.18 pointsPaper includes a separate major section which addresses the means and methods used in the attack. Identifies and discusses how the attack or security breach occurred. Addresses specific exploits or tools used in the attack or the suspected means / methods used by the attackers. Identifies and provides an assessment of security controls which were ineffective. Addresses known or suspected vulnerabilities which were exploited by the attackers.15 pointsPaper includes a complete and easily identifiable discussion of the means and methods used during the attack or the suspected ways in which the security breach occurred. (Add 1 point for discussion of specific exploits or tools used in the attack or the suspected means / methods used by the attackers. Add 1 point for discussion of security controls which were ineffective. Add 1 point for discussion of vulnerabilities which were exploited by the attackers).10 pointsIdentifies and discusses how the attack or security breach occurred or the suspected means / methods used by the attackers. Discusses one of the following: (a) tools & exploits, (b) ineffective security controls, or (c) vulnerabilities.5 pointsMentions how the attack occurred but does not specifically address means / methods, tools, exploits, security controls, or vulnerabilities.0 pointsDoes not address how the attack or breach occurred.Impacts of Attack on Information Security / Information Assurance (20%)20 pointsThe research paper contains a separate and thorough discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (All five characteristics are defined, discussed, and analyzed.)18 pointsThe research paper contains a separate and thorough discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least four of the characteristics are defined, discussed, and analyzed.)15 pointsThe research paper contains a separate and easily identified section which provides a discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least three of the characteristics are defined, discussed, and analyzed.)12 pointsThe research paper contains a separate and easily identified section which provides a discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least two of the characteristics are defined and discussed.)10 pointsThe research paper contains mention of known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least one characteristic is discussed.)0 pointsThe research paper does not contain any mention of the impacts of the attack.Identifies Technology Improvements (10%)10 pointsThe paper includes a section devoted to discussing technology improvements which could have prevented, detected, and deterred the attack. Discussion addresses technology improvements in security controls and vulnerability identification / remediation. The discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).9 pointsThe paper includes a section devoted to discussing technology improvements which could have prevented, detected, and deterred the attack. OR, discussion addresses technology improvements in the area of security controls and vulnerability identification / remediation. The discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).7 pointsThe paper includes discussion regarding technology improvements which could have prevented, detected, and/or deterred the attack (at least 2 of 3). Or, the paper includes discussion of technology improvements for security controls and vulnerability identification/remediation. The discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).5 pointsThe paper includes discussion about technology improvements which could prevent similar attacks in the future. Discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).3 pointsThe cybersecurity research paper mentions technology improvements that might prevent or deter future attacks. Mentions one or more of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).0 pointsThe cybersecurity research paper does not address technology improvements as a means for preventing similar attacks in the future.Quality of Research: Selection and Citing of Sources (10%)10 pointsResearch paper incorporates knowledge from 5 or more authoritative sources as evidenced by appropriate use of citations to credit sources for facts and information about the cybersecurity incident. Work contains a reference list containing entries for all cited resources.9 pointsResearch paper incorporates knowledge from 4 or more authoritative sources as evidenced by appropriate use of citations to credit sources for facts and information about the cybersecurity incident. Work contains a reference list containing entries for all cited resources.7 pointsResearch paper has no more than two paragraphs with omissions of citations crediting sources for facts and information about the cybersecurity incident. Work contains a reference list containing entries for all cited resources. Submitted work is based upon a minimum of three authoritative sources.5 pointsWork has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Submitted work is based upon a minimum of two authoritative sources.3 pointsAuthor attempted to credit authoritative sources did so in a manner that did not provide the reader with sufficient information to verify sources of information used in the research paper. Or, the author reported factual information without identifying / crediting sources beyond the required readings for the course.0 pointsReference list is missing. Work demonstrates an overall failure to research the cybersecurity incident. The submitted research paper does not credit authoritative sources for facts and other information used in the paper.Professionalism in Organization & Appearance (5%)5 pointsSubmitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.4 pointsSubmitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).3 pointsOrganization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.2 pointsSubmitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.1 pointSubmitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.0 pointsSubmitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.Professionalism in Writing Style (10%)10 pointsNo formatting, grammar, spelling, or punctuation errors.8 pointsWork contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.6 pointsErrors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work4 pointsSubmitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.2 pointsSubmitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.0 pointsSubmitted work is poorly executed OR does not reflect college level work.APA Style Compliance (5%)5 pointsReference list, reference list entries and in-text citations are complete (contain all required fields) and are formatted to APA style. In-text citations are placed at point of first use in each paragraph. In-text citations are correctly placed within the sentence to which they apply. (1 or 2 minor errors allowed.)4 pointsReference list, reference list entries and in-text citations are complete (contain all required fields) and are formatted to APA style. In-text citations are placed at point of first use in each paragraph. In-text citations are correctly placed within the sentence to which they apply. No more than 3 minor errors in APA style compliance for in-text citations and/or reference list entries.3 pointsIn-text citations are placed at point of first use in each paragraph. In-text citations are correctly placed within the sentence to which they apply. No more than 5 minor errors in APA format for in-text citations and/or reference list entries. Citations and reference list entries contain sufficient information for the reader to find and verify the resource.2 pointsWork contains no more than 7 minor errors in APA format for in-text citations and/or reference list entries. Citations may be misplaced or missing required information. Reference list entries contain enough information for the reader to find and verify the resource.1 pointWork does not comply with APA formatting requirements for reference list entries and in-text citations. Reference list entries contain enough information for the reader to find and verify the resource.0 pointsReference list and in-text citations do not contain enough information for the reader to find and verify resources used to write the paper. Or, reference list and citations are missing entirely.Overall ScoreLevel 690 or moreLevel 580 or moreLevel 470 or moreLevel 360 or moreLevel 240 or moreLevel 10 or more