Research paper

  
IuSeetions for the Breach Report ch Paper
See attached document for details. 

IT is a course that considers various aspects of computer and information security operations with the goal of elevating these concepts to the national infrastructure level. One consideration of analysis is to investigate lessons learned regarding historical large-scale security breaches that have taken place at the industry level. The Breach Report Paper is a short research exercise in which you are asked to find and become acquainted with one large-scale data breach or hacking crime that has been highlighted in the media. Then compare the outcome of events during that breach with one of the National Cyber Security Methodology Component principles from Chapter 1 (listed on slide 12 in the chapter 1 slide deck PDF).
                   
What is being researched?
You are to find one data breach event highlighted by the media that was a strong example of a cyber-attack or hacking event. 
· Your choice must be within the past 6 years. Please see “My Favorites” below for some examples, and feel free to use the examples for your own paper. 
· Your choice must be a large event that was publicly reported by major news media such as NBC news online or the New York Times online.
· Do NOT choose a scholarly article for the event. Do NOT pick passages from textbooks and other hardcopy media. Do NOT take information from Wikipedia. Your grade will be lowered if I cannot access the original news article over the Internet.
· Pick an event that is well-documented. Do NOT pick obscure articles such as a cyber event in Buford, Wyoming, the smallest town in America (population: 1). Again, use the My Favorites list below as a starting point if you are having trouble choosing a good cyber breach or hacking event.
  
What are you comparing?
A. As stated above, you are to pick one cyber-attack. Let’s say you choose the Capital One cyber-attack from 2019 in which a software engineer obtained the personal data of over 100 million people.  
B. Next, choose ONE of the operational principles from Chapter 1 in our textbook … Deception, Awareness, Depth, Diversity, Separation… whichever one you like. As an example, let’s say you pick the Awareness principle. Our textbook states that Situational Awareness is “the collective real-time understanding within an organization of its security risk posture.” In other words, Awareness is an organization’s knowledge of their security strengths and weaknesses (and we hope they are focused on improving their weaknesses).  
How do you synthesize your argument?
Using the above example, if you picked Capital One & Awareness, then your paper should (A) highlight what happened in the attack and (B) speculate how Capital One failed to “be aware” of the hole in their network security that allowed the hack to occur. Lastly, (C) if you picked Awareness, then argue why Cyber Security Awareness is important and defend your argument by referencing at least one peer-reviewed scholarly article.
So, in Summary…
1. Pick a recent cyber attack.
2. Reference at least one news article (non-scholarly) about the attack.
3. Pick a National Cyber Security principle (like Awareness).
4. Reference at least one scholarly article that backs up your chosen principle.
5. Synthesize how the company failed to comply to the principle. Typically, in these news articles security experts will outline what happened in the attack and what the company failed to do. If there is an expert response, you can tie the response to one of the principles. 
If there is no expert response or input, then you are welcome to “speculate” on what the company did wrong. Remember you don’t work for the company so you don’t know what’s really going on there. Therefore, for the purposes of writing the paper, speculation is OK.
Scope & Format of the Project
The scope and format your paper should be:
· 500-900 words. Microsoft Word. Double-spaced, Arial or Calibri font, APA format. Do NOT write a giant paper that will take me forever to grade please. Do NOT send me a virus-infected file.
· Introduce the article. What happened and who was involved?
· Make sure you thoroughly summarize what happened – what was stolen or compromised. What were the damages or losses if any? If the event was a solved crime, who were the criminal(s)?
· Your paper needs a minimum of two references in the bibliography:
ü At least one news article reference about the event.
ü At least one peer-reviewed scholarly article promoting the principle. 
· You can submit your paper in the classroom in the Breach Report assignment (in the CONTENT folder) or you can email it to me.
  
APA 6th Edition Writing Format
Doctoral-level, scholarly writing style is expected for this assignment. As PhD students, your ability to produce perfection in APA-formatted research will be heavily scrutinized; especially in the dissertation phase of your program. Keep in mind that your dissertation research will undergo scientific merit review, it will have to contribute to the global body of knowledge in a positive manner, and will have to be written in a quality of writing style high enough that the University is willing to put its name on your research when published. If you are uncomfortable with the APA6 format, now is the time during the classroom portion of your studies to learn it. APA-style writing is the global standard for academic research. Learn it… Know it… Live it. Your paper is expected to conform 100% to the 6th edition of the APA Publication Manual. 
PLAGIARISM STATEMENT
ALL OF YOUR WRITING MUST BE IN YOUR OWN WORDS. IF YOU COPY AND PASTE TEXT DIRECTLY FROM YOUR RESEARCH ARTICLES, YOU ARE GUARANTEED TO RECEIVE A ZERO GRADE.
Please heed this warning seriously. There will not be any make-ups or second tries. I will pass your writing through Safe Assign. Please make sure your writing is original.
My Favorites ????
If you’re having trouble finding a good article, you may want to consider some of my top favorite security bungles and crimes listed below. Feel free to pick any one of them or your own. These are all national- or world-wide scale events in commercial industry, latest first:
Capital One Breach – 2019
· https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html
· https://www.cnbc.com/2019/07/30/capital-one-hack-allegations-describe-a-rare-insider-threat-case.html
Facebook Breach – 2018
· https://abcnews.go.com/US/87-million-facebook-users-find-personal-data-breached/story?id=54334187
Under Armour Breach – 2018
· https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.html
Marriott Breach – 2018
· https://www.forbes.com/sites/thomasbrewster/2018/12/03/revealed-marriotts-500-million-hack-came-after-a-string-of-security-breaches/#9b6d37546f42
· NEW: Breach now tied to Chinese professional hackers:
https://www.cnn.com/2018/12/12/tech/chinese-marriott-hack/index.html
Equifax Data Breach – 2017
· https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding-millions-more-people-who-were-affected-by-its-massive-data-breach/?utm_term=.93746bd982c3
· https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/nickclements/2018/03/05/equifaxs-enormous-data-breach-just-got-even-bigger/&refURL=https://www.google.com/&referrer=https://www.google.com/
· https://www.wired.com/story/equifax-breach-no-excuse/
Panera Bread Breach – 2017 
· https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/
Wannacry Ransomware Attack – 2017
· https://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday,causing%20major%20disruptions%20worldwide
· https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/
· https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html
· https://www.npr.org/sections/thetwo-way/2017/12/19/571854614/u-s-says-north-korea-directly-responsible-for-wannacry-ransomware-attack
The Sony Pictures Hack – 2014: 
· https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/#thebeginning
· https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/?utm_term=.f34b2a0688d7
Home Depot Breach – 2014
· https://www.bankinfosecurity.com/target-home-depot-breaches-lessons-a-7544
· https://www.reuters.com/article/us-home-depot-breach-settlement/home-depot-settles-consumer-lawsuit-over-big-2014-data-breach-idUSKCN0WA24Z
· http://fortune.com/2017/03/09/home-depot-data-breach-banks/

Don't use plagiarized sources. Get Your Custom Essay on
Research paper
Just from $13/Page
Order Essay
Order your essay today and save 15% with the discount code: APRICOT

Order a unique copy of this paper

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal
Live Chat+1(405) 367-3611Email