Research Paper on Cyber Attacks

User Generated

qubavz

Computer Science

Description

Traditional Research - Literature Review Paper

Project Title: Cyber-attacks are increasing on the internet and smart phone devices. (The purpose of this research to find specific issues and potential solutions to these cyber-attacks. This research will use the qualitative approach to gather data from cyber-security professionals in order to identify the issues and solutions of this cyber-attacks)

Literature Review is a critical evaluation of peer-reviewed articles, texts, and other sources relevant to your research. The paper must contain a minimum of eight (8) peer-reviewed references published within the past 5 years.

Literature Review Content:

  • Subject or issue overview (do not rewrite the introduction)
  • Categorized or themed presentation of material supporting and refuting the subject or issue
  • Critical review and comparison of each referenced work
  • Conclusions based on the facts in the literature review

The paper should contain at least 6-8 pages of content not count title page, table page and a reference page.

Paper Requirements:

* Abstract, Table of contents, Introduction, conclusion and sub headings are mandatory

* APA Format should follow all APA rules (citations, quotations, references)

* Follow Template

* No Plagiarism

Unformatted Attachment Preview

Running Head: PROJECT TITLE 1 Cyber-attacks are increasing on the internet and smart phone devices Literature Review 2 PROJECT TITLE Literature Review The literature review section is a major section of your research paper and, as such, is preceded by a level one heading containing the words Literature Review and in accordance with the requirements in the Publication Manual. The literature review section is expected to be exhaustive in scope because of the extensive research you performed. The literature review is not intended to consist of stand-alone paragraphs that merely summarize the key ideas, facts, and findings from individual research literature sources. Rather, it is intended to be presented in a manner that integrates the key ideas, facts, and findings from the individual research literature sources into a single comprehensive narrative that clearly supports your problem statement, research question(s), rationale, and hypothesis. It must also clearly support the key findings and assertions presented in the discussion and conclusions sections of your paper. The narrative shall be written such that it establishes a clear relationship and continuity of thought and logic between the key ideas, facts, and findings taken from the various research literature sources you have identified. 3 PROJECT TITLE References 1. 2. 3. 4. 5. 6. 7. 8.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, your work is complete. thank you

1

Running head: Cyber Attacks

Cyber Attacks

Institutional Affiliation

Student’s Name

Cyber Attacks

2

Abstract
Cyber-attacks are increasing on the internet and smart phone devices. Over the past years, cyberattacks have evolved into complex activity making it difficult to curb. Most organizations have
fallen prey to cyber-attacks losing huge amounts of money. This Literature Review focuses on
specific issues and potential solutions to these cyber-attacks. It will bring out the major ways in
which cyber criminals have maliciously infiltrated the internet, organizations communication
systems, computers as well as smartphones.

Cyber Attacks

3

Table of Contents
Abstract ......................................................................................................................................................... 2
Introduction .................................................................................................................................................. 4
Statistical analysis ......................................................................................................................................... 4
Internet of Things.......................................................................................................................................... 5
Social media .................................................................................................................................................. 5
Zero-day vulnerabilities ................................................................................................................................ 6
Unsecure Wi-Fi .............................................................................................................................................. 7
Malicious applications................................................................................................................................... 8
Dealing with cyber-attacks............................................................................................................................ 8
Incident Management, Mitigating an Attack ................................................................................................ 8
Conclusion ................................................................................................................................................... 10
References .................................................................................................................................................. 11

Cyber Attacks

4

Introduction
A cyberattack is deliberate misuse of computer systems, networks and technology-dependent
enterprises. Cyberattacks utilize noxious code to adjust PC code, rationale or data, bringing about
troublesome outcomes that can compromise data and prompt cybercrimes, for example, data and
identity fraud. With the ascent of internet-connected gadgets, for example, cell phones and
tablets in the work environment, hackers endeavor to attack systems through vulnerabilities in
cell phones. Digital criminals looking to hold individuals to ransom over their own information,
digital security departments have cautioned, could target watches, TVs, and, SMART phones

Statistical analysi...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags