Search Our Essay Database

Cybersecurity Essays and Research Papers

Instructions for Cybersecurity College Essay Examples

Title: Cyber Security Cloud Computing

Total Pages: 4 Words: 1389 References: 7 Citation Style: APA Document Type: Essay

Essay Instructions: Answer ONLY TWO from the following questions with 300 or more words each. Use the textbooks, journal articles, cases from CD, or other sources to support your ideas. Note that due date is on Sunday (December 2) not on Monday as usual. Please allow time for the originality report.

1. Consider a recent cybersecurity breach (specific event) and address the following questions:
Describe the circumstances involved
Identify the ethical aspects associated with the breach
Identify the legal aspects associated with the breach
Provide at least three legal and at least three ethical recommendations which can be used to prevent similar circumstances from happening in the future

(Two Pages)

2. Assume that your company will be implementing cloud computing technology. Address the following questions:
Describe the technology and business benefits of its implementation
Discuss at least three ethical concerns of cloud computing for your company
Discuss at least three legal concerns of cloud computing for your company
Specify at least three ethical and at least three legal recommendations to prevent any concerns from the implementation of the cloud computing technology.

(Two Pages)


Baase, S. (2008) . Gift of fire: Social, legal, and ethical issues for computing and the Internet, (3rd ed.). Upper Saddle River, NY: Pearson / Prentice Hall.

Spinello, R.A. (2011). Cyberethics: Morality and Law in Cyberspace, 4th Edition. Jones & Bartlett Learning, LLC.

Excerpt From Essay:

Title: Cybersecurity as an Organizational Strategy An Ethical and Legal Perspective

Total Pages: 10 Words: 3101 Works Cited: 10 Citation Style: MLA Document Type: Research Paper

Essay Instructions: Project 4 - 10% of your grade

Topic/Themes: Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective


Prepare a short paper of approximately 8-12 pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications. The paper must include at least 10 literature sources and may be include the following topics:

Following topics to address:
-Cybersecurity as an organizational strategy: a literature review
-Implementing a cybersecurity strategy: legal, ethical, and technical considerations
-The role of IT and cybersecurity in the organizational performance
-Diffusing cybersecurity strategy from the top to the bottom of the organization
-Practical recommendations for creating a cybersecurity strategy


Spinello, R.A. (2011). Cyberethics: Morality and Law in Cyberspace, 4th Edition. Jones & Bartlett Learning, LLC.

Baase, Sara. of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd edition

Excerpt From Essay:

Title: Cybersecurity

Total Pages: 10 Words: 2738 Bibliography: 10 Citation Style: APA Document Type: Essay

Essay Instructions: Develop an argument for what you believe is the single most important cybersecurity vulnerability facing IT managers today.

The paper should include at a minimum a complete description of the vulnerability, the reasons why it is the most important, the impact of this vulnerability on organizations and how organizations can best address its potential impacts. (Note: A vulnerability is a security weakness; a vulnerability is not a security threat.)

Prepare the paper in Word. Include a minimum of 5 sources. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Sources should be authoritative sources such as scholarly journal articles, textbooks, etc. Note: No wiki, study guide, dictionaries or Blog references.

I can provide the login information for my school's library to conduct research for articles if necessary.
Grading Criteria:
Content (80%):

Clarity of cybersecurity vulnerability (0 ? 20 points):
**The vulnerability chosen is thoroughly developed and clearly stated.

Clarity of mitigation (0-20 points):
**The mitigation approach presented is thorough and complete.

Clarity of organizational impact of vulnerability (0 ? 20 points):
**The impact on organizations and organizational response to chosen vulnerability is thoroughly developed and logically presented.

Quality of documented support (0 ? 20 points):
**The discussion in the paper is based on a thorough review of the literature.

Paper Format (20%):

Organization & length (0-7points):
**The content is well organized with clear transitions among major subtopics. Meets length requirements.

Writing style (0-7points):
**Graduate level writing is reflected throughout the paper, including accurate spelling, punctuation, grammar, and sentence structure

Use of proper APA formatting (0-6 points):
**In-text citations are presented in proper APA format and all sources are identified in the reference list and cited in proper APA format.

Excerpt From Essay:

Title: Cybersecurity

Total Pages: 16 Words: 4325 Sources: 6 Citation Style: MLA Document Type: Research Paper

Essay Instructions: Master’s Level Case Study: The use of information technology (IT) by the United States government for data acquisition, process control, information management systems, and numerous other cyber-based activities, continues to grow. This also means that if these systems are not secured a cyber intruder can gain access to sensitive government documents and systems.

Research two different cases where U.S. cybersecurity was breached through information systems that could have jeopardized national security. (needs to be 16 pages in length, approximately 8 pages on each case give or take)
Explain in detail what happened in the case and the method by which the hacker/intruder breached cybersecurity (worm,virus,hacking, etc.). Then explain how the agency addressed the security breach (installed new firewalls, stronge passwords, etc)

Example Case 1: A hacker stole a file containing the names and Social Security numbers of 1,500 people working for the Energy Department’s nuclear weapons agency, scary eh? The data theft occurred in a puter system at a service center belonging to the National Nuclear Security Administration in Albuquerque, New Mexico. The file contained information about contract workers throughout the agency’s nuclear weapons plex.

Example Case 2: After allegedly hacking into NASA websites — where he says he found images of what looked like extraterrestrial spaceships — the 40-year-old Briton faces extradition to the United States from his North London home. If convicted, McKinnon could receive a 70-year prison term and up to $2 million in fines. McKinnon, whose extensive search through U.S. puter networks was allegedly conducted between February 2001 and March 2002, picked a particularly poor time to expose U.S. national security failings in light of the terror attacks of Sept. 11, 2001.

(These are just examples to give the writer an idea of what types of cases I am looking for)

This paper will be run thru a plagiarism software scanning system, so all sources need to be cited accurately. I do not need to receive the paper until Tuesday May 8, 2007 after lunch. Any questions call or email with Case Study in the subject heading.

The Journal of Information Systems Security and other Homeland Security journals are good resources. The format is left up to the writer as long as it a standard type like APA or MLA. Someone with a strong II background would be a good candidate to write this.

KEYWORDS: cybersecurity, cyberterrorism

Excerpt From Essay:

Request A Custom Essay On This Topic


I really do appreciate I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.

Tiffany R

I have had all positive experiences with I will recommend your service to everyone I know. Thank you!

Charlotte H

I am finished with school thanks to They really did help me graduate college..

Bill K