Cybersecurity Essays and Research Papers

Instructions for Cybersecurity College Essay Examples

Title: Cyber Security Cloud Computing

  • Total Pages: 4
  • Words: 1389
  • References:7
  • Citation Style: APA
  • Document Type: Essay
Essay Instructions: Answer ONLY TWO from the following questions with 300 or more words each. Use the textbooks, journal articles, cases from CD, or other sources to support your ideas. Note that due date is on Sunday (December 2) not on Monday as usual. Please allow time for the originality report.

1. Consider a recent cybersecurity breach (specific event) and address the following questions:
Describe the circumstances involved
Identify the ethical aspects associated with the breach
Identify the legal aspects associated with the breach
Provide at least three legal and at least three ethical recommendations which can be used to prevent similar circumstances from happening in the future

(Two Pages)

2. Assume that your company will be implementing cloud computing technology. Address the following questions:
Describe the technology and business benefits of its implementation
Discuss at least three ethical concerns of cloud computing for your company
Discuss at least three legal concerns of cloud computing for your company
Specify at least three ethical and at least three legal recommendations to prevent any concerns from the implementation of the cloud computing technology.

(Two Pages)

References:

Baase, S. (2008) . Gift of fire: Social, legal, and ethical issues for computing and the Internet, (3rd ed.). Upper Saddle River, NY: Pearson / Prentice Hall.

Spinello, R.A. (2011). Cyberethics: Morality and Law in Cyberspace, 4th Edition. Jones & Bartlett Learning, LLC.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
References:

References

Baase, S. (2008). Gift of fire: Social, legal, and ethical issues for computing and the Internet, (3rd ed.). Upper Saddle River, NY: Pearson / Prentice Hall.

Brenner, B. (2009). Monster.com Breach (Again!): Evolution of a Disclosure Letter. Retrieved from: http://www.csoonline.com/article/478083/monster.com-breach-again-evolution-of-a-disclosure-letter

Quigley, M. (2008). Encyclopedia of Information Ethics and Security. New York: Idea Group Inc. (IGI), 2008

Lewis, J.A. (2003). Cyber Security: Turning National Solutions into International Cooperation: A Report of the Csis Technology and Public Policy Program. Washington, DC: CSIS

Molen, F. (2010). Get Ready for Cloud Computing: A Comprehensive Guide to Virtualization and Cloud Computing. New Delhi: Haren Publishing.

Shoemaker, D., et al. (2011). Cyber security: The Essential Body of Knowledge. New York, NY: Cengage Learning.

Spinello, R.A. (2011). Cyberethics: Morality and Law in Cyberspace, 4th Edition. Jones & Bartlett Learning, LLC.

Winkler, V. (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics. London: Elsevier.

Order Custom Essay On This Topic

Title: Cybersecurity as an Organizational Strategy An Ethical and Legal Perspective

  • Total Pages: 10
  • Words: 3101
  • Works Cited:10
  • Citation Style: MLA
  • Document Type: Research Paper
Essay Instructions: Project 4 - 10% of your grade

Topic/Themes: Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective

Description:

Prepare a short paper of approximately 8-12 pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications. The paper must include at least 10 literature sources and may be include the following topics:

Following topics to address:
-Cybersecurity as an organizational strategy: a literature review
-Implementing a cybersecurity strategy: legal, ethical, and technical considerations
-The role of IT and cybersecurity in the organizational performance
-Diffusing cybersecurity strategy from the top to the bottom of the organization
-Practical recommendations for creating a cybersecurity strategy

References:

Spinello, R.A. (2011). Cyberethics: Morality and Law in Cyberspace, 4th Edition. Jones & Bartlett Learning, LLC.

Baase, Sara. of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd edition

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Works Cited:

References

Baase, S. (2008) . Gift of fire: Social, legal, and ethical issues for computing and the Internet, (3rd ed.). Upper Saddle River, NY: Pearson / Prentice Hall.

Bodeau, D., Boyle, S., Fabius-Greene, J., and Graubart-R. (2010, September). Cyber security governance: A component of MITRE's Cyber Prep Methodology. MITRE Technical Report. The MITRE Corporation. {Paper presented at the ITS Montreal 2008.

Burstein, A.J. (2008, April). Conducting cybersecurity research legally and ethically. Berkeley School of Law, 18, 42. [Post]. University of California, Berkeley, CA. Retreived http://static.usenix.org/event/leet08/tech/full_papers/burstein/burstein_html/

Goodman, M. (2011, November). What business can learn from organized crime. Harvard Business Review, [Web page]. Cambridge, MA: Harvard Business Review. Retrieved http://hbr.org/2011/11/what-business-can-learn-from-organized-crime/ar/1

Gordon, L.A. (2010, December 3) Cybersecurity: How much is too much? Retrieved http://www.bizjournals.com/washington/print-edition/2010/12/03/cybersecurity-how-much-is-too-much.html?page=all

Lynch, J. (2012, October). Hogan Lovells hosts Law Review's cybersecurity symposium in Washington, D.C. [Post]. Chronicle of Data Protection. Washington, D.C.: Hogan Lovells. Retreived http://www.hldataprotection.com/2012/10/

articles/consumer-privacy/hogan-lovells-hosts-law-reviews-cybersecurity-symposium-in-washington-dc/

Schjolberg, J.S. And Hubbard, A. (2005). Harmonizing national legal approaches on cybercrime Retrieved www.itu.int/.../

Background_Paper_Harmonizing_National_and_Legal_Approaches_on-Cybercrime.pdf

Spinello, R.A. (2011). Cyberethics: Morality and Law in Cyberspace, 4th Edition. Jones & Bartlett Learning, LLC.

____. Cybersecurity: Mission integration to protect your assets. (2011). Booz Allen Hamilton. Retrieved www.boozallen.com/.../Cybersecurity-Mission-integration-to-protect-your-assets-fs.pdf.

____. (2007, August) PCAST Report, Leadership Under Challenge: Information Technology R&D in a Competitive World. Retrieved http://search.whitehouse.gov/search?affiliate=wh&query=cybersecurity++literature&submit.x=41&submit.y=13&form_id=usasearch_box

[Type text] [Type text] [Type text]

Order Custom Essay On This Topic

Title: Cybersecurity

  • Total Pages: 10
  • Words: 2738
  • Bibliography:10
  • Citation Style: APA
  • Document Type: Essay
Essay Instructions: Develop an argument for what you believe is the single most important cybersecurity vulnerability facing IT managers today.

The paper should include at a minimum a complete description of the vulnerability, the reasons why it is the most important, the impact of this vulnerability on organizations and how organizations can best address its potential impacts. (Note: A vulnerability is a security weakness; a vulnerability is not a security threat.)

Prepare the paper in Word. Include a minimum of 5 sources. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Sources should be authoritative sources such as scholarly journal articles, textbooks, etc. Note: No wiki, study guide, dictionaries or Blog references.

I can provide the login information for my school's library to conduct research for articles if necessary.
__________________________________________________________________________
Grading Criteria:
Content (80%):

Clarity of cybersecurity vulnerability (0 ? 20 points):
**The vulnerability chosen is thoroughly developed and clearly stated.

Clarity of mitigation (0-20 points):
**The mitigation approach presented is thorough and complete.

Clarity of organizational impact of vulnerability (0 ? 20 points):
**The impact on organizations and organizational response to chosen vulnerability is thoroughly developed and logically presented.

Quality of documented support (0 ? 20 points):
**The discussion in the paper is based on a thorough review of the literature.

Paper Format (20%):

Organization & length (0-7points):
**The content is well organized with clear transitions among major subtopics. Meets length requirements.

Writing style (0-7points):
**Graduate level writing is reflected throughout the paper, including accurate spelling, punctuation, grammar, and sentence structure

Use of proper APA formatting (0-6 points):
**In-text citations are presented in proper APA format and all sources are identified in the reference list and cited in proper APA format.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Bibliography:

References

Ashford, W. (2014, October 8). Public sector sees cybercrime as rising threat. Retrieved from Computer Weekly: http://www.computerweekly.com/news/2240113782/Public-sector-sees-cybercrime-as-rising-threat

Broggi, J.J. (2014). BUILDING ON EXECUTIVE ORDER 13,636 TO ENCOURAGE INFORMATION SHARING FOR CYBERSECURITY PURPOSES. Harvard Journal of Law and Public Policy, 9(12), 653-676.

Carr, J. & . (2010). Inside cyber warfare. Sebastopol, Calif: O'Reilly Media, Inc.

Chen, T. & . (2009). Guarding Against Network Intrusions. In J.R. VaccaComputer and Information Security Handbook. Amsterdam: Elsevier.

Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking . Indianapolis, Indiana:: JohnWiley and Sons.

Kelly, B.B. (2012). INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY "HACKTIVISM" CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM. Boston University Law Review, 92(5), 1663-1711.

Mulligan, D.K. (2011). Doctrine for cybersecurity. Daedalus, 140(4), 70-92.

Pfleeger, S.L. (2008). Cybersecurity economic issues: Clearing the path to good practice. IEEE Software, 21(11), 35.

Thompson, K.K. (2011). Not like an egyptian: Cybersecurity and the internet kill switch debate*. Texas Law Review, 465-495.

Zhang, Z. (2011). ENVIRONMENTAL REVIEW & CASE STUDY: NERC's cybersecurity standards for the electric grid: Fulfilling its reliability day job and moonlighting as a cybersecurity model. Environmental Practice, 13(3), 250-264.

Order Custom Essay On This Topic

Title: Cybersecurity

  • Total Pages: 16
  • Words: 4325
  • Sources:6
  • Citation Style: MLA
  • Document Type: Research Paper
Essay Instructions: Master’s Level Case Study: The use of information technology (IT) by the United States government for data acquisition, process control, information management systems, and numerous other cyber-based activities, continues to grow. This also means that if these systems are not secured a cyber intruder can gain access to sensitive government documents and systems.

Research two different cases where U.S. cybersecurity was breached through information systems that could have jeopardized national security. (needs to be 16 pages in length, approximately 8 pages on each case give or take)
Explain in detail what happened in the case and the method by which the hacker/intruder breached cybersecurity (worm,virus,hacking, etc.). Then explain how the agency addressed the security breach (installed new firewalls, stronge passwords, etc)

Example Case 1: A hacker stole a file containing the names and Social Security numbers of 1,500 people working for the Energy Department’s nuclear weapons agency, scary eh? The data theft occurred in a puter system at a service center belonging to the National Nuclear Security Administration in Albuquerque, New Mexico. The file contained information about contract workers throughout the agency’s nuclear weapons plex.

Example Case 2: After allegedly hacking into NASA websites — where he says he found images of what looked like extraterrestrial spaceships — the 40-year-old Briton faces extradition to the United States from his North London home. If convicted, McKinnon could receive a 70-year prison term and up to $2 million in fines. McKinnon, whose extensive search through U.S. puter networks was allegedly conducted between February 2001 and March 2002, picked a particularly poor time to expose U.S. national security failings in light of the terror attacks of Sept. 11, 2001.

(These are just examples to give the writer an idea of what types of cases I am looking for)

This paper will be run thru a plagiarism software scanning system, so all sources need to be cited accurately. I do not need to receive the paper until Tuesday May 8, 2007 after lunch. Any questions call or email with Case Study in the subject heading.

The Journal of Information Systems Security and other Homeland Security journals are good resources. The format is left up to the writer as long as it a standard type like APA or MLA. Someone with a strong II background would be a good candidate to write this.



KEYWORDS: cybersecurity, cyberterrorism

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Sources:

References

Bridis, T. (2001, June 27). Net espionage stirs Cold War tensions. Neohapsis -- Peace of Mind through Integrity and Insight. Retrieved May 8, 2007, at http://archives.neohapsis.com/archives/isn/2001-q2/0460.html

Drogin, B. (1999, October 7). Russians seem to be hacking into the Pentagon. San Francisco Chronicle. Retrieved May 8, 2007, at http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1999/10/07/MN58558.DTL

Fermilab policy on computing. (2005, November 30). Fermi National Accelerator Laboratory. Retrieved May 8, 2007, at http://security.fnal.gov/policies/cpolicy.html

Goodwin, B. (2003, October 31). Briton pleads guilty to U.S. nuclear lab hacking attack. ComputerWeekly.com. Retrieved May 8, 2007, at http://www.computerweekly.com/Articles/2003/10/31/198323/Briton-pleads-guilty-to-us-nuclear-lab-hacking-attack.htm

Interview: John Arquila. (2003, April 24). PBS: Frontline. Retrieved May 8, 2007, at http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/arquila.html

Kitfield, J. (2000, September 19). CIA, FBI and Pentagon team to fight terrorism. GovernmentExecutive.com. Retrieved May 8, 2007, at http://www.govexec.com/dailyfed/0900/091900nj.htm

Leyden, J. (2004, February 4). Victory for commonsense in nuke lab hacking case. The Register. Retrieved May 8, 2007, at http://www.theregister.co.uk/2004/02/04/victory_for_commonsense_in_nuke/

Teen hacker avoids jail sentence. (2004, February 2). BBC News. Retrieved May 8, 2007, at http://news.bbc.co.uk/2/hi/technology/3452923.stm

Van, J. (2003, July 11). Fermilab hacking suspect held. Chicago Tribune. Online edition. Retrieved May 8, 2007, at http://www.securityhookup.com/fermilab.pdf

Vistica, G. (1999, September 20). We're in the middle of a cyberwar. Newsweek, 134(12), p. 52.

Order Custom Essay On This Topic
Request A Custom Essay On This Topic Request A Custom Essay
Testimonials:
“I really do appreciate HelpMyEssay.com. I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.’’ Tiffany R
“I have had all positive experiences with HelpMyEssay.com. I will recommend your service to everyone I know. Thank you!’’ Charlotte H
“I am finished with school thanks to HelpMyEssay.com. They really did help me graduate college.’’ Bill K