Research Paper (Weight: 15%) CMPS 385 Computer Security Submission Due of the report: April 2, 2020 by 10 am. Spring 2020 Project Title: Ukraine Attacks Objectives of this Research Paper This research provides you an opportunity to investigate for deeper knowledge and analysis about a major cyber attack that took place in real world. This security incident helps you to understand and develop your research skills in the area of computer security. The deliverable of this research is an academic research article. The learning objectives of this research are: 1. Demonstrate advanced written communication and presentation skills. 2. Develop advanced level of analytical skills and critical thinking 3. Demonstrate skill in literature survey 4. Develop advanced knowledge in the area of real information security incidents. Background You need to study thoroughly the following cyber incident that took place a few years ago: Ukraine’s Power Grid Attack: In 2015, hackers launched the attack and took control of the Ukrainian power distribution control centers, cutting off the power supply to 30 substations. Your Tasks Write a comprehensive research article/paper on the above cyber attack. You need to search for relevant papers and reports on this security incident in order to get details. This research is based on three major aspects: A. Information gathering: Understanding the attack, consequences (impact), and actions with factual information. You need to do comprehensive literature review in order to get details information. B. Analysis: Analyze the above factual information in the lens of a security expert. This is your own analysis based on the information gathered. You may also provide deeper analysis on which ways this attack is different and in which ways they are similar. What went wrong, which countermeasure(s) could have prevented this attack, etc. C. Lesson learned: Provide your own recommendations to other similar organizations about the similar attacks in the future. You must first identify the following from an academic point of view: • The details of the breach, what went wrong, which assets were attacked, and how, what was the outcome of the attack, who were the threat actors, impact of the attacks, etc.: • Technical aspect of the attack (how the attacker did it, what techniques were used by the attacker), • The impacts of the attack or the consequences after the attack • The immediate actions or reactions of the organization • The response strategies of the organization took (immediate and long term) before and after the attack. • What steps the organization took after the attack such as mitigating process employed, any proactive defense that the organization took • Any other protection approaches that the organization employed before or after the attack. Research CMPT-642 Fall 2018 Page 1 of 6 Your research will be evaluated based on accuracy, justification, clarity, comprehensiveness, and analysis. Grade Distribution Criteria Comprehensiveness and correctness of fact and information Critical literature review Analysis of the fact and situation Recommendations Written presentation of the paper (Language, structure of the paper, use of figures, tables, etc.) Grading % 20 20 20 20 20 100 Total Grading rubrics Grade 90 -100% 80 – 89% 70 – 79% 0 – 69% Rubrics Excellent research paper with logical flow of sections, very thorough logical and deeper analysis, detail factual information, a good number of papers used, useful recommendations, outstanding presentation. Fully achieved the four learning objectives. The paper is probably publishable after a minor revision. Very good research paper but with some weak logical explanation or justification, analysis is not quite complete, the factual information could include some more information. Sometimes the explanation/artifacts may not be clear. Not fully achieved the four learning objectives. The paper is publishable but with a major revision. Good but with several weak analysis and justifications. The explanation/artifacts may not be very logical and/or realistic. Some aspects of analysis or recommendation may be partially missing. Partially achieved the four learning objectives. The paper is not publishable Not satisfactory with a lack of logical explanations. Did not include many papers as reference, many facts are missing, presentation is not good. Preparation of your paper Structure your articles into several sections and sub sections such as: Title, Abstract, Introduction or motivation, Attack, Impact, Analysis, Discussion, Recommendation, Conclusion, etc. These are just suggestions, you can use other structure. Provide tables and diagrams if needed. In order to do this research, you have to read some research papers/articles on this topic. Several relevant articles are available from the Internet, especially from IEEE, ACM Digital libraries. QU library has a good electronic source of articles. For IEEE visit (http://library.qu.edu.qa/#I), and for ACM see (http://library.qu.edu.qa/#A). You must refer at least 10 articles in your paper. You must use the IEEE Computer Society press conference template attached in APPENDIX-A. Use single column format. Research CMPT-642 Fall 2018 Page 2 of 6 Submission requirements Don't use plagiarized sources. Get Your Custom Essay on
Ukraine Attacks
Just from $13/Page
APPENDIX-A An excellent style manual for science writers is [7]. References example |
Professional homework help features
Our Experience
However the complexity of your assignment, we have the right professionals to carry out your specific task. ACME homework is a company that does homework help writing services for students who need homework help. We only hire super-skilled academic experts to write your projects. Our years of experience allows us to provide students with homework writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How our professional homework help writing services work
You first have to fill in an order form. In case you need any clarifications regarding the form, feel free to reach out for further guidance. To fill in the form, include basic informaion regarding your order that is topic, subject, number of pages required as well as any other relevant information that will be of help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download