IuSeetions for the Breach Report ch Paper
See attached document for details.
IT is a course that considers various aspects of computer and information security operations with the goal of elevating these concepts to the national infrastructure level. One consideration of analysis is to investigate lessons learned regarding historical large-scale security breaches that have taken place at the industry level. The Breach Report Paper is a short research exercise in which you are asked to find and become acquainted with one large-scale data breach or hacking crime that has been highlighted in the media. Then compare the outcome of events during that breach with one of the National Cyber Security Methodology Component principles from Chapter 1 (listed on slide 12 in the chapter 1 slide deck PDF).
What is being researched?
You are to find one data breach event highlighted by the media that was a strong example of a cyber-attack or hacking event.
· Your choice must be within the past 6 years. Please see “My Favorites” below for some examples, and feel free to use the examples for your own paper.
· Your choice must be a large event that was publicly reported by major news media such as NBC news online or the New York Times online.
· Do NOT choose a scholarly article for the event. Do NOT pick passages from textbooks and other hardcopy media. Do NOT take information from Wikipedia. Your grade will be lowered if I cannot access the original news article over the Internet.
· Pick an event that is well-documented. Do NOT pick obscure articles such as a cyber event in Buford, Wyoming, the smallest town in America (population: 1). Again, use the My Favorites list below as a starting point if you are having trouble choosing a good cyber breach or hacking event.
What are you comparing?
A. As stated above, you are to pick one cyber-attack. Let’s say you choose the Capital One cyber-attack from 2019 in which a software engineer obtained the personal data of over 100 million people.
B. Next, choose ONE of the operational principles from Chapter 1 in our textbook … Deception, Awareness, Depth, Diversity, Separation… whichever one you like. As an example, let’s say you pick the Awareness principle. Our textbook states that Situational Awareness is “the collective real-time understanding within an organization of its security risk posture.” In other words, Awareness is an organization’s knowledge of their security strengths and weaknesses (and we hope they are focused on improving their weaknesses).
How do you synthesize your argument?
Using the above example, if you picked Capital One & Awareness, then your paper should (A) highlight what happened in the attack and (B) speculate how Capital One failed to “be aware” of the hole in their network security that allowed the hack to occur. Lastly, (C) if you picked Awareness, then argue why Cyber Security Awareness is important and defend your argument by referencing at least one peer-reviewed scholarly article.
So, in Summary…
1. Pick a recent cyber attack.
2. Reference at least one news article (non-scholarly) about the attack.
3. Pick a National Cyber Security principle (like Awareness).
4. Reference at least one scholarly article that backs up your chosen principle.
5. Synthesize how the company failed to comply to the principle. Typically, in these news articles security experts will outline what happened in the attack and what the company failed to do. If there is an expert response, you can tie the response to one of the principles.
If there is no expert response or input, then you are welcome to “speculate” on what the company did wrong. Remember you don’t work for the company so you don’t know what’s really going on there. Therefore, for the purposes of writing the paper, speculation is OK.
Scope & Format of the Project
The scope and format your paper should be:
· 500-900 words. Microsoft Word. Double-spaced, Arial or Calibri font, APA format. Do NOT write a giant paper that will take me forever to grade please. Do NOT send me a virus-infected file.
· Introduce the article. What happened and who was involved?
· Make sure you thoroughly summarize what happened – what was stolen or compromised. What were the damages or losses if any? If the event was a solved crime, who were the criminal(s)?
· Your paper needs a minimum of two references in the bibliography:
ü At least one news article reference about the event.
ü At least one peer-reviewed scholarly article promoting the principle.
· You can submit your paper in the classroom in the Breach Report assignment (in the CONTENT folder) or you can email it to me.
APA 6th Edition Writing Format
Doctoral-level, scholarly writing style is expected for this assignment. As PhD students, your ability to produce perfection in APA-formatted research will be heavily scrutinized; especially in the dissertation phase of your program. Keep in mind that your dissertation research will undergo scientific merit review, it will have to contribute to the global body of knowledge in a positive manner, and will have to be written in a quality of writing style high enough that the University is willing to put its name on your research when published. If you are uncomfortable with the APA6 format, now is the time during the classroom portion of your studies to learn it. APA-style writing is the global standard for academic research. Learn it… Know it… Live it. Your paper is expected to conform 100% to the 6th edition of the APA Publication Manual.
PLAGIARISM STATEMENT
ALL OF YOUR WRITING MUST BE IN YOUR OWN WORDS. IF YOU COPY AND PASTE TEXT DIRECTLY FROM YOUR RESEARCH ARTICLES, YOU ARE GUARANTEED TO RECEIVE A ZERO GRADE.
Please heed this warning seriously. There will not be any make-ups or second tries. I will pass your writing through Safe Assign. Please make sure your writing is original.
My Favorites ????
If you’re having trouble finding a good article, you may want to consider some of my top favorite security bungles and crimes listed below. Feel free to pick any one of them or your own. These are all national- or world-wide scale events in commercial industry, latest first:
Capital One Breach – 2019
· https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html
· https://www.cnbc.com/2019/07/30/capital-one-hack-allegations-describe-a-rare-insider-threat-case.html
Facebook Breach – 2018
· https://abcnews.go.com/US/87-million-facebook-users-find-personal-data-breached/story?id=54334187
Under Armour Breach – 2018
· https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.html
Marriott Breach – 2018
· https://www.forbes.com/sites/thomasbrewster/2018/12/03/revealed-marriotts-500-million-hack-came-after-a-string-of-security-breaches/#9b6d37546f42
· NEW: Breach now tied to Chinese professional hackers:
https://www.cnn.com/2018/12/12/tech/chinese-marriott-hack/index.html
Equifax Data Breach – 2017
· https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding-millions-more-people-who-were-affected-by-its-massive-data-breach/?utm_term=.93746bd982c3
· https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/nickclements/2018/03/05/equifaxs-enormous-data-breach-just-got-even-bigger/&refURL=https://www.google.com/&referrer=https://www.google.com/
· https://www.wired.com/story/equifax-breach-no-excuse/
Panera Bread Breach – 2017
· https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/
Wannacry Ransomware Attack – 2017
· https://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday,causing%20major%20disruptions%20worldwide
· https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/
· https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html
· https://www.npr.org/sections/thetwo-way/2017/12/19/571854614/u-s-says-north-korea-directly-responsible-for-wannacry-ransomware-attack
The Sony Pictures Hack – 2014:
· https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/#thebeginning
· https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/?utm_term=.f34b2a0688d7
Home Depot Breach – 2014
· https://www.bankinfosecurity.com/target-home-depot-breaches-lessons-a-7544
· https://www.reuters.com/article/us-home-depot-breach-settlement/home-depot-settles-consumer-lawsuit-over-big-2014-data-breach-idUSKCN0WA24Z
· http://fortune.com/2017/03/09/home-depot-data-breach-banks/
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. My Essay Gram is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download