Edudorm Facebook

Research Project. For this project, you will research a recent threat (discovered within the last 12 months) to the security of an e-commerce operation. You will define and describe the threat including its discovery, history, impact on e-commerce operati

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Research Project. For this project, you will research a recent threat (discovered within the last 12 months) to the security of an e-commerce operation. You will define and describe the threat including its discovery, history, impact on e-commerce operations, technical features, and risk.


Project Procedures
Research: You are expected to use credible sources upon which to base your report. In cases when the source is necessary, but credibility is not assured, you must address this issue in the text of your paper. You are required to use APA style for both in-text citations and the Reference section at the end of your paper. You can learn more about APA-style references by clicking the APA tutorial link near the bottom of the Syllabus. You must use a minimum of four sources.

Originality: Although you will be using outside sources for this project--and using citations to indicate where ideas have come from within the sources--all writing must be in your own words. No direct quotations of outside sources are allowed.

Required Elements

Cover page
Table of contents
Presentation of the threat including how the threat was identified, the technical features that characterize the threat, how it works, vulnerabilities it exploits, and so forth
Diagram depicting the mechanism of attack and exploitation
Potential or actual consequences including damage to hardware, software, data, personnel, financial losses, and so forth: You should identify the nature of the security compromise (i.e., data confidentiality, integrity, availability).ZZRisk assessment based on the concepts presented in the Week 3 Lecture
Deliverables: The minimum length of the paper--not counting the cover page, table of contents, and references--is 3 double-spaced pages. 

Grading Rubrics
Category    Points    %    Description
Presentation of the threat    25    25    Include a complete history of the threat including how it was identified, what damage it has caused to date, what vulnerabilities it can exploit, and the nature of the source (criminal, commercial, skilled hackers, unskilled hackers, etc.).
Technical description    25    25    Explain the technical features of the vulnerabilities exploited and the mechanism by which the threat achieves its goals.
Diagram    20    20    Demonstrate the mechanism of the threat.
Presentation    30    30    Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors). There is correct attribution and citation using APA style.
Total    100    100    A quality paper will meet or exceed all of the above requirements.

414 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...