Cybersecurity Research Paper

Cybersecurity Research Paper

Select a research topic from the list below. After selecting your
topic, research the incident using news articles, magazine
articles (trade press), journal articles, and/or technical
reports from government and industry.

For a grade of A, a minimum of five authoritative sources
(not including course modules and the course textbook) are
required.

For a grade of B, a minimum of four authoritative sources
(not including course modules and the course textbook) are
required.

For a grade of C, a minimum of three authoritative
sources (not including course modules and the course textbook)
are required.

Your research is to be incorporated into a 3- to 5-page
written .studypool.com/communications-homework-help”>analysis
of the attack or incident. Your report is to be
prepared using APA formatting and submitted as an MS Word
attachment to the Cybersecurity Research Paper entry in your
assignments folder.

Pre-approved topics include

Adobe Source Code & Customer Data hacked
(2013)

APT1 (see HYPERLINK “http://intelreport.mandiant.com/” Mandiant report of
People’s Liberation Army cyberattacks)

CryptolockerRansomware (2013)

DigiNotar Certificate Theft / Compromise (detected in
2011)

HomeDepotdata breach (2014)

Operation High Roller (detected in 2012)

GameoverZeuS botnet (countered by Operation Tovar; made
public in 2014)

RSA SecurID breach (2011)

Target data breach (2013/2014)

Telephone Tech Support Scam (2014) see HYPERLINK
“http://www.ic3.gov/media/2014/141113.aspx”
http://www.ic3.gov/media/2014/141113.aspx

You may propose an alternate topic for your instructor’s
approval.
Approval is NOT guaranteed. Your request for
approval should be posted as a message in the Ask Your
Instructor conference.

1. Short
Topic Name

2. URL for
news article about the security incident or attack that you
will research for your paper

3. URL for
a second authoritative Internet resource that you will use to
provide .studypool.com/accounting-homework-help”>information
about your chosen security incident or attack.

Ideas for additional topics can be found on various
security-related websites, including

ID Theft Resource Center ( HYPERLINK “http://www.idtheftcenter.org/images/breach/DataBreachReports_2014.pdf”
2014 Data Breach Report) HYPERLINK “http://www.idtheftcenter.org” http://www.idtheftcenter.org

Bruce Schneier on Security HYPERLINK “http://www.schneier.com/blog/”
http://www.schneier.com/blog/

Carnegie-Mellon CERT: HYPERLINK “http://www.cert.org/insider_threat/study.html”
http://www.cert.org/insider_threat/study.html

CSO Online: HYPERLINK “http://www.csoonline.com/” http://www.csoonline.com/

Data Breach Today HYPERLINK “http://www.databreachtoday.com” http://www.databreachtoday.com

SC Magazine: HYPERLINK “http://www.scmagazine.com/” http://www.scmagazine.com/

Symantec: HYPERLINK “http://www.symantec.com/threatreport/”
http://www.symantec.com/threatreport/

US-CERT: HYPERLINK “http://www.us-cert.gov/security-publications/”
l “reports” http://www.us-cert.gov/security-publications/#reports

After you have performed your research, use your sources
to analyze the major characteristics of the cybersecurity
incident. Your
analysis must include:

identifying the type of breach

identifying and explaining how the breach occurred (or
suspicions by authorities as to how it may have
occurred)

identifying and discussing known or suspected losses of
confidentiality, integrity, and availability for information
and/or information systems

identifying and discussing technological improvements
that would help prevent recurrence

Cybersecurity Research Paper