Explore and evaluate a specific IT Security breach, or area of vulnerability to an industry.

Description

research paper requirements:

Don't use plagiarized sources. Get Your Custom Assignment on
Explore and evaluate a specific IT Security breach, or area of vulnerability to an industry.
From as Little as $13/Page

The purpose of this project is to explore and evaluate a specific IT Security breach, or area of vulnerability to an industry, government, or private entity. You will focus on a specific area relative to overall IT Security, and provide details, background, and the outcome of the IT Security related incident. Your paper should relate a specific event, case, or related area of study and document how your subject aligns with the 8 domains of Info security set forth by the ISC2 Common Body of Knowledge (CBK).Your topic or incident may affect one or more of ISC2 CBK domains.

1. Security and Risk Management

2. Asset Security

3. Security Engineering

4. Communication and Network Security

5. Identity and Access Management

6. Security Assessment and Testing

7. Security Operations

8. Software Development Security

Students should compose a 5-to-7-page paper that comprises of the following area(s):

Focuses on a specific IT Security Incident, vulnerability, or prevention method
Details the specifics of an incident, hack, denial of service, attack, or response to an event
Define how your subject relates to the overall ISC2 CBK (domains listed above)
Identify gaps in security, or changes that resulted from the threat/vulnerability
Explain the resolution used (if any) and its association with your incident
What was the gap (if any) in security that allowed the data breach or attack?

***Also, please feel free to give your opinion, thoughts, and feelings on a specific incident, what you felt could have been done to prevent the vulnerability, or what should be changed relative to IT Security countermeasures.

This should be a college level paper or presentation, of 5 to 7 pages, with an introduction, and summary. It should contain the following.

12-point font
Graphics as needed
Bibliography and source documents
No typing or spelling errors
Proper use of grammar
Formatted professionally
All original work

Extra credit will be awarded if you find an incident or company NOT listed below. Some example topics that may fall into this category (use these if you are having trouble finding a topic, or if you find any of these interesting):

Stuxnet Virus (in depth, how, who, when, why, consequences)

Target Breach (how, who, what method was used)

DNC Hacking (who, how, what technology was compromised)

Yahoo data breach

Linked IN data breach

Sony hack/attack purportedly by South Korea

TJX theft of consumer data

The Panama Papers

Edward Snowden

Chelsea Manning

Dyn DNS DDOS attack

Equifax

NotPetya (Maersk)

Uber (2017)

Panera

Chipotle

MY PREFERENCE IS YOU TO FIND AN INCIDENT OR COMPANY NOT LISTED ABOVE.