Computer Programming

SoccerBoss
Category:
Programming
Price: $25 USD

Question description

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.

For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.

For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.

Pre-approved topics include

Adobe Source Code & Customer Data hacked (2013)

APT1 (see HYPERLINK "http://intelreport.mandiant.com/" Mandiant report of People’s Liberation Army cyberattacks)

CryptolockerRansomware (2013)

DigiNotar Certificate Theft / Compromise (detected in 2011)

HomeDepotdata breach (2014)

Operation High Roller (detected in 2012)

GameoverZeuS botnet (countered by Operation Tovar; made public in 2014)

RSA SecurID breach (2011)

Target data breach (2013/2014)

Telephone Tech Support Scam (2014) see HYPERLINK "http://www.ic3.gov/media/2014/141113.aspx" http://www.ic3.gov/media/2014/141113.aspx

You may propose an alternate topic for your instructor’s approval. Approval is NOT guaranteed. Your request for approval should be posted as a message in the Ask Your Instructor conference.

1. Short Topic Name

2. URL for news article about the security incident or attack that you will research for your paper

3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.

Ideas for additional topics can be found on various security-related websites, including

ID Theft Resource Center ( HYPERLINK "http://www.idtheftcenter.org/images/breach/DataBreachReports_2014.pdf" 2014 Data Breach Report) HYPERLINK "http://www.idtheftcenter.org" http://www.idtheftcenter.org

Bruce Schneier on Security HYPERLINK "http://www.schneier.com/blog/" http://www.schneier.com/blog/

Carnegie-Mellon CERT: HYPERLINK "http://www.cert.org/insider_threat/study.html" http://www.cert.org/insider_threat/study.html

CSO Online: HYPERLINK "http://www.csoonline.com/" http://www.csoonline.com/

Data Breach Today HYPERLINK "http://www.databreachtoday.com" http://www.databreachtoday.com

SC Magazine: HYPERLINK "http://www.scmagazine.com/" http://www.scmagazine.com/

Symantec: HYPERLINK "http://www.symantec.com/threatreport/" http://www.symantec.com/threatreport/

US-CERT: HYPERLINK "http://www.us-cert.gov/security-publications/" \l "reports" http://www.us-cert.gov/security-publications/#reports

After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:

identifying the type of breach

identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)

identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

identifying and discussing technological improvements that would help prevent recurrence

Grading Rubric: the detailed rubric is attached to the assignment folder entry for this paper.

Rubric Name: Research Paper Rubric

Criteria
Overall Score

Submit Files


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UCLA
PREMIUM TUTOR
Studypool has helped 1,244,100 students
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1820 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors