Cyber Security

Feel free to chose any topic relating to Cyber/Homeland Security.  You can research new technologies, security, SCADA, hacking, crypto currency/block chain, spoofing, cloaking, networking, cyber crimes, open source intelligence etc.  These topics should tie into homeland security.

Research Paper Format:
Students will be required to write a paper (due as per Class Schedule below). This paper will be 15-20 pages in length (not including references, appendices) and will research and analyze a cybersecurity technology, a Cyber security threat/solution matrix or a Cyber War/Cyberpower doctrine. Where helpful, papers should include relevant charts/graphs/graphical models to assist the reader in understanding the material and highlighting key paper points and serve to advance the topics of the paper. All papers will be prepared in accordance with Modern Language Association (MLA) standards for format, citing and documentation of references, etc. as detailed below.

Modern Language Association (MLA) standards:
Modern Language Association (MLA) standards for format, citing and documentation of references etc. are detailed below and at the MLA General Guidelines website (Links to an external site.)Links to an external site.

  1. Papers must be typed on a computer and printed on standard white paper 8.5 inches by 11 inches, portrait.
  2. The text of the paper must be double-spaced using Times New Roman or another similar font, 12 point only.
  3. Leave only one space after periods and other punctuation marks.
  4. The margins of the document must be one inch on all sides. Paragraphs are to be indented one-half inch from the left margin (five spaces or press “Tab” once).
  5. All pages are to be numbered consecutively in the upper right-hand corner, one-half inch from the top, and flush with the right margin.
  6. Use either italics or underlining consistently throughout the document for the titles of longer works and, only when necessary, to provide emphasis.
  7. Endnotes are to be on a separate page before the Works Cited page.
*I would like a topic relating the importance of physical security standards to cybersecurity. For example, you can have the most advanced cyber program in the world, but if your physical security is not up to par and you leave the door unsecured to your offsite data facility, then your cyber program is worthless. 

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>