fbpx

Cyber Security| Online Assignment Help

A utility company’s website is attacked by a botnet, a program built specifically to replicate malicious software on the Web. It was spreading rapidly online by injecting itself into vulnerable websites and then waiting for unsuspecting users to click on the site. When they did, the code copied itself on their computers. In a few months, 360,000 sites had been infected. The botnet was diabolically engineered to sniff out the Achilles heel in SQL. The botnet co-opted an application on the company Website and injected itself directly into a company database. The fear was that in the process, it could get past the utility’s larger security perimeter and have its way with the company’s software portfolio of applications, database tools and other code. It also had the potential to install itself on the computers of anyone who visited the utility’s website. The attack was a legitimate risk to the utility company.

Don't use plagiarized sources. Get Your Assignment on
Cyber Security| Online Assignment Help
Just from $13/Page
Order Now

The utility knew it wanted (needed) a new culture for how it engineered, developed and tested its software. It also knew it wanted that culture grounded in widely accepted standards. That way, coders could learn from one another, and the company would not be re-inventing its cultural wheel to make its software more secure. The catch was, no one on staff knew much about how to make applications safer.

The design phase of the cyber security development lifecycle (CSDL) requires developers to create something called a cyber threat model. That is, a sense of the cyber attacks an application might face. What kind of exploits might a cyber attacker use? How would hackers gain access to an application running on a computer network? What older, existing pieces of code associated with the new application might be vulnerable? This overall feel for the risks an application might come under allows coders to anticipate risks. Threat models need not be complex: Even high-quality ones can be done on the back of cocktail napkins.

Once the standard was set, critical areas were addressed and basic training was completed, next up was spreading the new cyber security culture inside the utility. Two basic lines of work emerged: remediation on the existing code where needed, and maximizing the cyber security of all new code created from that point on. The company-wide remediation was a copy of the early, high-level work on the website: carefully anticipating threats identified by the utility‘s version of CSDL, analyzing each threat and then refactoring code where necessary. This strategic work was buttressed by scanning tools that helped identify high, medium and low risks. But, despite this automatic assistance, it was immediately clear the work ahead would not be easy.

Time was something the utility’s coders had little of. Its IT department was designed to be an internal resource for the coding needs of various departments: providing the company’s energy traders with a new way to manage their inventory, helping human resources manage employee benefits, and planning how utilities route their electricity or gas. But, under a mandate from the top, they found a way. And, slowly, cyber software security at the utility moved from afterthought to top-of-mind. Under CSDL, the utility now started with cyber security. Step one in the process was identifying a well-thought-out set of cyber threats that showed where a piece of software might be weak. How would the code be used? What was at risk? Then, using its new test tools and protocols, the entire development team became responsible for keeping the code within the standard. The utility had even gone so far as to install a last step — a human review to triple check that all new code cleared the cyber security bar before it went live.

1.What does the design phase of the cyber security development lifecycle (CSDL) require developers to create?

2. Once the standard was set (critical areas were addressed and basic training was completed; next up was spreading the new cyber security culture inside the utility), what were the two basic lines of work that emerged?

3.Why is cyber security not an absolute?

 

Topic:  Cyber Security Development Lifecycle

Link to Presentation: http://booksite.elsevier.com/9780123918550/casestudies/Chapter_04.html

Name 3 Ways

Paper Organization (300pts)

Use Times New Roman 12 font and double spaced. Ensure you are familiar with current APA guidelines  as it relates to  writing research paper.

  1. Cover page (Use sample paper as a guide) (10pts)
  2. Need introduction paragraph with thesis statement (50pts)
  3. Three different paragraphs with each practice (90pts)
  4. Concluding paragraph (50pts)
  5. Reference page (50pts)
  6. Follow APA Guidelines (50pts)
  7. 5 to 6 pages total

PPT Presentation (About 30 minutes Long; 200pts)

  • Wear Business Attire (10pts)
  • Slide 1-Cover page with title (10pts)
  • Slide 2– Group Names
  • Slide 3- Table of content (5 pts)
  • Slide 4-Introduction (20pts)
  • Slide 5-Thesis statement (20pts)
  • Slides 6, 7, and 8- Different ideas in different paragraphs (75pts)
  • Slide 9-Summary (20pts)
  • Slide 10-References (40pts)
Please follow and like us:
error20
Tweet 176
fb-share-icon92

Calculate your paper price
Pages (550 words)
Approximate price: -

Why Choose Us

Quality Papers

At Myhomeworkwriters.com, we always aim at 100% customer satisfaction. As such, we never compromise the quality of our essay services. Our essay helpers ensure that they craft each paper carefully to match the requirements in the instruction form.

Professional Academic Writers

With Myhomeworkwriters.com, every student is guaranteed high-quality, professionally written papers. We ensure that we hire individuals with high academic qualifications who can maintain our quality policy. These writers undergo further training to sharpen their writing skills, making them more competent in writing academic papers.

Affordable Prices

Our company maintains a fair pricing system for all paper writing services to ensure affordability. Our pricing system generates quotations based on the properties of individual papers.

On-Time delivery

MyHomeworkWriters guarantees all students of swift delivery of papers. We understand that time is an essential factor in the academic world. Therefore, we ensure that we deliver the paper on or before the agreed date to give students ample time for reviewing.

100% Originality

Myhomeworkwriters.com maintains a zero-plagiarism policy. As such, MyHomeworkWriters ensure that they use the students’ instructions to deliver plagiarism-free papers. We are very keen on avoiding any chance of similarities with previous papers.

Customer Support 24/7

Our customer support works around the clock to provide students with assistance or guidance at any time of the day. Students can always communicate with us through our live chat system or our email and receive instant responses. Feel free to contact us via the Chat window or support email: support@myhomeworkwriters.com.

Try it now!

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Samples

Our writers complete papers strictly according to your instructions and needs, no matter what university, college, or high school you study in.

Categories
All samples
Analysis (any type)
Argumentative essays
Dissertation/Dissertation chapter
Analysis (any type)
Advantages and disadvantages of lowering the voting age to thirteen
Undergrad. (yrs 1-2)
Political science
4
View this sample
Argumentative essays
Is euthanasia ethical or not?
Undergrad. (yrs 3-4)
Nursing
3
View this sample
Dissertation/Dissertation chapter
Videoconferencing as a teaching tool
Undergrad. (yrs 3-4)
Education
10
View this sample

Our Essay Writing Services

MyHomeworkWriters holds a reputation for being a platform that provides high-quality academic services. All you need to do is provide us with all the necessary requirements and wait for quality results.

Essays

Essay Writing Services

At MyHomeworkWriters, we have highly qualified academic gurus who will offer great assistance towards completing your essays. Our essay help service providers are well-versed with all the aspects of developing high-quality and relevant essays.

Admissions

Admission and Business Papers

With Myhomeworkwriters.com, we will help you secure a position at your desired institution. Our essay writing services include the crafting of admissions papers. We will still help you climb your career ladder by helping you write the official papers that will help you secure a job. We will guide you on how to write an outstanding portfolio or resume.

Editing

Editing and Proofreading

Myhomeworkwriters.com has a professional editorial team that will help you organize your paper, paraphrase it, and eliminate any possible mistakes. Also, we will help you check on plagiarism to ensure that your final paper posses quality and originality.

Coursework

Technical papers

My Homework Writers harbors professional academic writers from diverse academic disciplines. As such, we can develop essay help services in all academic areas. The simplicity or complexity of the paper does not affect the quality of essay writing services.

Sitemap: https://myhomeworkwriters.com/sitemaps/sitemap.xml User-agent: * Allow: / User-agent: AhrefsBot Crawl-Delay: 1 User-agent: SemrushBot Crawl-Delay: 1
Social media & sharing icons powered by UltimatelySocial