Order from us for quality, customized work in due time of your choice.
Research by finding a NEW scholarly article or case study using the same methodo
Research by finding a NEW scholarly article or case study using the same methodology for your week 1 assignment, discuss ONE of the following computer crimes/incidents:
1) Network intrusions
2) Destruction of data and information
3) Denial of service attack
4) Theft of logins and passwords
5) Malicious code and programs
6) IP spoofing
7) Information warfare
8) Cyber-terrorism
When discussing your article, at the end you will formulate a research question. This research should be similar to the following:
Example 1 addressing topic 4, theft of logins and passwords:
Evidence that demonstrates your question is valid:
Asiri et al. (2023), assert that continued use devices in Industrial Control Systems (ICS) where the default password has not been changed continues to cause significant security issues for these entities. This would suggest that there is a gap in information security best practices training and awareness.
Question – Understanding and comprehending current information security best practices, why are basic tasks such as changing default passwords still being ignored?
So what makes this a valid research question?
You have shown that this question is supported by current literature
You can formulate a proper hypothesis that shows and IV and DV.
Example hypothesis/null hypothesis:
Hypothesis:
There is a no correlation between information security best practices training and password compromises.
Null Hypothesis:
There is a correlation between information security best practices training and password compromises.
Above I mentioned an IV (independent variable) and a DV (dependent variable). It is important to understand the relationship between the IV and DV in order to have a proper research question in order to develop a proper hypothesis.
IV – The variable that is changed
DV – The variable being observed
For example, the IV would be training and the DV would password compromises.
Asiri, M., Saxena, N., Gjomemo, R., & Burnap, P. (2023). Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM transactions on cyber-physical systems, 7(2), 1-33.
Using at least 500 words:
Task 1 – Summarize the article you have chosen and state your research question, hypothesis/null hypothesis and your IV and DV.
You will be graded on Content/Subject Knowledge, Critical Thinking Skills, Organization of Ideas, and Writing Conventions.
Order from us for quality, customized work in due time of your choice.