For this assignment,students will write a 2,500-3,000 word research paper thataddresses your response to a network breach. Consider the following scenario:

A small business hasdiscovered that sensitive information about some of its patents is availablefor sale on the Dark Web. It is your conclusion that this information was stolenfrom outside the network (not from an insider). You will need to determine thepossible entry points of this attack, develop an evidence report, and outlinesteps to help prevent an attack in the future.

Your paper willconsist of the following sections.

  • Method of Attack – Analyze the possible attack points and potential vulnerabilities in the network that could have been exploited. Compare and contrast vulnerabilities and discuss reasons that an attacker would choose a particular method over another (e.g., illegitimate TDCP state sequences).
  • Develop an Evidence Report – In this section, create a sample evidence report that details findings of the attack. You do not need to include a table of contents or signature page, but ensure the key components of an evidence report are present. Based upon the vulnerabilities you analyzed, create a fact-based report of the investigation. Remember your audience will not be technically savvy.
  • Preventing Future Attacks – Describe methods that will help to ensure such a breach does not recur. Compare and contrast tools that are used to detect and stop incoming attacks; discuss policies and procedures that can be enacted to prevent such attacks.

Formatting & Sources

While you should drawupon most of the lessons in this course, the following may be helpful whencompleting this assignment:

Please write yourpaper in the APA format. You may refer to the course material for supportingevidence, but you must also use five to seven sources and cite them using APAformat. Please include a mix of both primary and secondary sources, with atleast one source from a scholarly peer-reviewed journal. If you use anyStudy.com lessons as sources, please also cite them in APA (including thelesson title and instructor’s name).

  • Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
  • Secondary sources come from peer-reviewed scholarly journals, such as Journal of Forensic Sciences, Journal of Digital Forensics, Security, and Law and International Journal of Cybersecurity and Forensics. You may use sources like JSTOR, Google Scholar, to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"