There is a maximum of 5 pages, including references and diagrams.
There is a maximum of 5 pages, including references and diagrams. This represent around 4200 words of content. However, it is the page count which is the limit, NOT the word count. The maximum page count is a limit not a target, you may provide work that you feel requires fewer pages to complete it.
Assessment Question
Rigorous quantitative and qualitative analytical methods for Cyber Threat Intelligence Analysis and Cyber Risk Analysis are often not well implemented within organisations.
Critically analyse why this is the case and identify approaches which may be used to overcome any identified inhibitors to adoption.
You must include a section in the conclusion which identifies THREE key points you personally have learnt from doing the research for this essay. Each point should:
1) Be referenced to the authoritative sources where you discovered it
2) Identify why it is relevant to the question
3) Provide a reflection on why it is important to you.
A good answer will:
Show a deep understanding of what makes a rigorous method
Clearly compare Quant and qual methods in CTIA and CRA
Compare and Analyse CITA and CRA
Identify barriers or inhibitors to implementation and adoption of rigorous methods
Draw a clear conclusion drawing strong inferences for theory and practice
Be well researched and evidenced
Useful References:
Hubbard, D., & Seiersen, R. (2016). How to Measure Anything in Cybersecurity Risk.
Taleb, N. N. (2010). The black swan: the impact of the highly improbable. 2nd ed., Random trade pbk. ed. New York: Random House Trade Paperbacks.
Jack Freund and Jack Jones. 2014. Measuring and Managing Information Risk: A FAIR Approach. Butterworth-Heinemann, USA.
Aldasoro, Iñaki and Gambacorta, Leonardo and Giudici, Paolo and Leach, Thomas, The Drivers of Cyber Risk (May 20, 2020). BIS Working Paper No. 865,
P. Rathod and T. Hämäläinen, “A Novel Model for Cybersecurity Economics and Analysis,” 2017 IEEE International Conference on Computer and Information Technology (CIT), 2017, pp. 274-279, doi: 10.1109/CIT.2017.65.
Ryan Stillions. The DML Model. 2014. URL: https://ryanstillions.blogspot.com/2014/04/the-dml…
Wiem Tounsi and Helmi Rais. ‘A survey on technical threat intelligence in the age of sophisticated cyber attacks’. In: Computers & security 72 (2018), pp. 212–233
Stephen Marrin (2017) Understanding and improving intelligence analysis by learning from other disciplines, Intelligence and National Security, 32:5, 539-547, DOI: 10.1080/02684527.2017.1310913
David Strachan-Morris (2012) Threat and Risk: What Is the Difference and Why Does It Matter?, Intelligence and National Security, 27:2, 172-186, DOI: 10.1080/02684527.2012.661641
Marking Guidelines:
Beyond the assessment of the formatting and language use you will be assessed on the following items:
Critical Understanding of the topic (45%)
Structure and evidence of the research undertaken (15%)
Use of literature to support arguments (5%)
The conclusions you have drawn (20%)
Language (5%)
Structure and presentation (10%)
*Note I want a critical analysis of it and please don’t use any of GPT sources because its detected here. Also you can look up for different research paper in google scholar I need 10 – 15 references at least.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.