Write a Research paper on Cybersecurity attacks against military drones
Write a Research paper on Cybersecurity attacks against military drones
In this assignment, you will investigate one type of targeted attacks, how it happens and
identify countermeasures. The topics to be chosen based on your last name initials as
below
Topic 1 IoT DDOS
The report should be at most one page (including references; single spaced; 11 pt font).
Your paper can include at least one references from the following sources:
a. IEEE Computer Society Digital Library
http://www.computer.org/publications/dlib/
b. ACM Digital Library http://www.acm.org/dl
c. www.networkworld.com
6
Note on Using Wikipedia: Do not include Wikipedia as a reference. Wikipedia and other
online resources may be good places to start collecting information, but do NOT include
Wikipedia as your reference. Find original sources of information and site them.
Research some common issues with data formatting, transfer, and manipulation. In APA format, write 3 paragraphs describing some of the issues you learned about. Describe why such issues might represent a problem for data analysts. Cite at least three sources in APA format. .
Too often, statistics are used to ‘prove’ some point or to persuade an audience to some particular point of view, without really being accurate, complete, or honest. This issue has been the subject of numerous texts. You may be interested in reading such titles as: Damned Lies and Statistics, or How to Lie with Statistics. To fulfill this discussion board activity, complete the following:
Research one example where data analysis might have been misused or misapplied. Read about the example thoroughly so that you understand how analytics was used, and why it was problematic.
Share your chosen example, documenting your source. Be sure to summarize the scenario thoroughly.
Explain why use of analytics contributed to the problem.
Discuss the consequences of the matter. Did the company/organization involved suffer any adverse consequences? If so, were the related to public opinion/trust, were they financial, were they punitive, etc.?
Define a directory service and what it is used for. Discuss the current needs for this type of service.
What are air gaps in network architectures and why are they important?
Discuss some of the various backup tools available in the market. What are the differences among the computer forensic tools discussed within the reading?
I need a 15- to 20-page, APA-formatted document (3750 to 5500 words) pertaining to the Linux operating system. As many sources as needed.
An abstract
A narrative expanding the key points from the prior document, including the following:
Definitions, explanations, and examples in your own phrasing
Personal experiences, if there are any
Personal thoughts and opinions about the topic
Your conclusions about the topic
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study
Topic Breakdown –
Project Topic – A small local Texas bank hired a external company to house their datacenter. The external company is under fire because of a security breach. This breach is causing the bank to want to house their data locally.
Problem Statement or Project Purpose – Texas Bank began as a modest family-owned bank and has now expanded to become a Fortune 500 organization seeking to compete with other larger banks in the market. There have been concerns with the virtualization of Texas Bank’s networks and systems. Although Texas Bank has network administrators, systems administrators, and engineers on staff, they are having trouble monitoring their operations due to their IAAS plan with a third-party provider. A few weeks ago, the vendor had a data breach in which three individuals posing as Hvac technicians gained access to the server warehouse and were able to attach USB sticks with malicious payloads. Though the data of Texas Bank was not compromised, the organization is now planning to build in its own data center that must utilize the greatest degree of protection to ensure that physical security is never compromised.
Project Scope
a. Project Goal(s) and Supporting Objectives –
a.1 Design and construct the allocated area for said intended data center.
a.2 Implement access control precautions to ensure that the server farm’s security is not compromised.
a.3 Have a process for daily operations.
a.4 Include a summary of the expenses connected with personnel wages that are necessary for the datacenter.
b. Project Outcomes and Deliverables –
b.1 A policy and plan for datacenter security
b.2 A server layout detailing the components by service
b.3 Strategy of operating and sustaining the datacenter after its implementation
b.4 Cost breakdowns for personel and operations of the datacenter
c. Projected Project End Date –
c.1 In four weeks, the project will be done
c.2 In the first week, the datacenter is inspected and a facility layout is created
c.3 Week two is utilized to establish safeguards and a security plan
c.4 Week three the hardware will be installed in the datacenter, provisioned, and connected to the bank’s Isp
c.5 Week 4 Verify that security precautions are set and business processes are operating smoothly.
IMPLEMENTATION and EVALUATION:
Describe how you will approach the execution of your project –
Assess the physical security risks observed in the majority of datacenters.
1. Creating a layout using the allocated space by Texas Bank and outlining protective measures.
2. Specifying where equipment will be installed and how it should be physically accessible.
3. Install physical security precautions.
4. Determine the amount of money needed to adequately staff the center.
5. Verify all security protocols and ensure that operations are functioning normally.