Major characteristics of the cybersecurity incident

Analyze the major characteristics of the cybersecurity incident. Your analysis must include the below information.

Review your selected resources to make sure that you have at least one article or paper that provides an answer for each of the major content items for your research paper:

1. identifying the type of breach

2. identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)

3. identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

4. identifying and discussing technological improvements that would help prevent recurrence

5. Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

6. For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.

7. For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.

8. For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

9. Your research is to be incorporated into the students’ 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using basic APA formatting (see below) and submitted as an MS Word.

10. Pre-approved topics include

11. Stuxnet virus

12. ChoicePoint data breach- This is the topic I picked**

13. T.J. Maxx data breach

14. Operation Aurora

15. Operation Shady RAT

16. RSA SecurID breach

17. China-related attack(s) against Google’s corporate infrastructure

18. Operation High Roller

Order from us and get better grades. We are the service you have been looking for.