Directions for the Research Paper Due in Week Four:
Given the importance of information security, students will conduct research and write a consolidated, thematic essay on the selected case study or topic:
Analyzing and identifying potential vulnerabilities, and specific counter measures to employ to mitigate the threat.
Discuss how a fully developed ISP mitigates security intrusions that have the potential to compromise a systems operational stability.
Evaluating the proactive measures as well as the legal, technological, and policy aspects of information security.
Evaluating the best practices of the DHS IT Strategic Plan and how these can be incorporated into an overall ISP to optimize system security.
You must base and support your report using external research, the course textbook, and supplemental course materials. Your external research must be reliable and authoritative, preferably from peer-reviewed (refereed) publications. You must include a minimum of five (5) course-external references.
The paper must provide complete and equitable treatment of all issues. Address all of the issues in a consolidated way, making linkages between the issues where appropriate and logical.
Your external research should be integrated to provide logical support for your consolidated examination of the fundamental ideas being expressed. All submissions must include the following technical components:
A cover or title page with your name on it.
Labeled topical headings (e.g., Introduction, Discussion, Conclusion, Recommendations, etc.).
Length: The report must contain a body of text of between 1,750 to 2,000 typed words (about 7 to 8 pages double-spaced).
A reference page containing a minimum of five (5) course-external resources used and cited in the report.
References cited at the end of the report must be cited in text to illustrate how they were used.
Written in APA Style.
Please review the Grading Rubric (linked below) to understand how your assignment will be assessed and ask questions if you do not understand any of it.
Students are expected to prepare new, original work for all written assignments. Do not use or reuse previously submitted work. Questions about assignments may be referred to the instructor.
Hacking and Related Case Studies
Human Engineering Case Studies
Viruses and related Case Studies
Financial Theft Case Studies
A comparative analysis of threats to information security
Cyber-attack case studies and examples
Case Study on actual training exercises aimed at enhancing information security systems
Information Security Threats to the US Department of Defense
Information Security Threats to Corporations
Information Security Threats to Law Enforcement
The Emergency Response Management Cycle with a Focus on mitigating information security threats
Protocol Models for responding to a Cyber Attack
National Response Plan
Federal Government Involvement in developing an Infrastructure to eradicate cyber-threats
US Department of Defense’s role in countering cyber threats
FBI’s role in countering cyber threats
Any other professor approved topics that are course – topic related.