I need support with this Computer Science question so I can learn better.
Student Paper Phase 1: Mini-Literature Review and Annotated Bibliography
Find a topic in Cyber Security that appeals to you. Your textbook chapters have various topic
discussions and examples and you can expand on any one of these topics. There is also a list
below of suggested topics. Do not limit yourself to the textbook or the list below.
The topic needs to be appealing enough to be able to expand on it and write a good, technical
paper about it. The paper can be a survey of elements or a focused discussion of a topic or a
more detailed explanation of a method (e.g., Kerberos authentication, a biometric method,
process of a distributed denial of service attack, etc.).
Once you have identified a topic that appeals to you but BEFORE you write the paper, you
need to survey what has been written about it and learn more about your topic.
For Phase 1 of your Student Paper, you are to submit a mini- literature review in the form of
an annotated bibliography. Aim for 8-10 articles coming from published periodicals, journal
articles, newspaper articles or even reliable internet articles. As you read, write a 9-10
sentence summary of the main highlights of the article. This method will help you remember
ideas and the sources where they came from.
The following are a few websites giving guidance how to write an annotated bibliography (feel
free to google additional sites):
For purposes of the course student paper, please use the following guide for the IEEE Citation
style for references:
Submit your annotated bibliography in word .DOCX format (with a cover page, 7-10 pages,
single-line spacing for the content summary itself, but double line spacing for other parts of
the paper, Calibri 12 size font, standard margins).
https://csis-prod.s3.amazonaws.com/s3fspublic/2001… QKa •
https://en.wikipedia.org/wiki/List_of_security_hac… 2. Explain the different types of malware (virus vs worm vs trojan vs spyware,e tc.) and their effects on systems and data. 3. Explain the method and impact of one highly publicized malware: • I Love You virus • Ransomware • Petya • Notpetya 4. Explain and give examples of various Social Engineering methods in Cyber Attacks. 5. What is Cyber Warfare? Which countries are involved? You may focus on one country and enumerate and explain cyber incidents that were attributed to them? 6. What is Cyber Terrorism? Name one or several groups. Explain their methods of attack and the political agenda they were trying to assert. Chapter 2: Laws, Policy, and Regulations 1. Laws Promulgated to Help Prevent Cyber Attacks 2. Privacy Laws Chapter 3: Cryptography 1. Symmetric Encryption Methods 2. Assymetric Encryption Methods 3. Quantum Cryptography 4. SSL/TLS and IPSec 5. What is a VPN? How does it work? Chapter 4: 1. Denial of Service Attack 2. Distributed Denial of Service Attack 3. ARP Poisoning 4. IP Spoofing Chapter 5 1. Methods of Biometric Authentication 2. Devices Used for Biometric Authentication 3. Methods of Cryptographic Authentication (there are many methods; explain and demonstrate one) Chapter 6 1. Intrusion Prevention Systems 2. Intrusion Detection Systems 3. Explain and illustrate Firewall Protective Measures Chapter 7 1. Explain and illustrate an SQL Injection Attack 2. Web Browser Attacks Chapter 10 1. What is a Cyber Kill Chain? 2. Enumerate and explkain the different stages of a Cyber Attack as developed by the SANS Institute.