Explore and evaluate a specific IT Security breach, or area of vulnerability to an industry.
Explore and evaluate a specific IT Security breach, or area of vulnerability to an industry.
the work is related to the IT field .
The Professor listed some incident or company just to give us ideas but the preference is to find something not listed for complete credit.
research paper requirements:
The purpose of this project is to explore and evaluate a specific IT Security breach, or area of vulnerability to an industry, government, or private entity. You will focus on a specific area relative to overall IT Security, and provide details, background, and the outcome of the IT Security related incident. Your paper should relate a specific event, case, or related area of study and document how your subject aligns with the 8 domains of Info security set forth by the ISC2 Common Body of Knowledge (CBK).Your topic or incident may affect one or more of ISC2 CBK domains.
1. Security and Risk Management
2. Asset Security
3. Security Engineering
4. Communication and Network Security
5. Identity and Access Management
6. Security Assessment and Testing
7. Security Operations
8. Software Development Security
Students should compose a 5-to-7-page paper that comprises of the following area(s):
Focuses on a specific IT Security Incident, vulnerability, or prevention method
Details the specifics of an incident, hack, denial of service, attack, or response to an event
Define how your subject relates to the overall ISC2 CBK (domains listed above)
Identify gaps in security, or changes that resulted from the threat/vulnerability
Explain the resolution used (if any) and its association with your incident
What was the gap (if any) in security that allowed the data breach or attack?
***Also, please feel free to give your opinion, thoughts, and feelings on a specific incident, what you felt could have been done to prevent the vulnerability, or what should be changed relative to IT Security countermeasures.
This should be a college level paper or presentation, of 5 to 7 pages, with an introduction, and summary. It should contain the following.
12-point font
Graphics as needed
Bibliography and source documents
No typing or spelling errors
Proper use of grammar
Formatted professionally
All original work
Extra credit will be awarded if you find an incident or company NOT listed below. Some example topics that may fall into this category (use these if you are having trouble finding a topic, or if you find any of these interesting):
Stuxnet Virus (in depth, how, who, when, why, consequences)
Target Breach (how, who, what method was used)
DNC Hacking (who, how, what technology was compromised)
Yahoo data breach
Linked IN data breach
Sony hack/attack purportedly by South Korea
TJX theft of consumer data
The Panama Papers
Edward Snowden
Chelsea Manning
Dyn DNS DDOS attack
Equifax
NotPetya (Maersk)
Uber (2017)
Panera
Chipotle
MY PREFERENCE IS YOU TO FIND AN INCIDENT OR COMPANY NOT LISTED ABOVE.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.