Select a research topic from the list below after selecting


Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.

For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.

For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

Your research is to be incorporated into the students' 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using basic APA formatting (see below) and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your Web Tycho assignments folder.

Pre-approved topics include

Stuxnet virus

ChoicePoint data breach

T.J. Maxx data breach

Operation Aurora

Operation Shady RAT

RSA SecurID breach

China-related attack(s) against Google's corporate infrastructure

Operation High Roller

FinFisher attacks on activists (suppression of political dissent)

You may propose an alternate topic for your instructor's approval. Approval is NOT guaranteed. Your request for approval (posted as a reply to the message in the Week 2 conference) must contain the following information:

1. Short Topic Name

2. URL for news article about the security incident or attack that you will research for your paper

3. URL for a second authoritative Internet resource that you will use to provide information about your chosen security incident or attack.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Select a research topic from the list below after selecting
Reference No:- TGS01031896

Expected delivery within 24 Hours