Cyber white paper
CLASSIFICATION: UNCLASSIFIED
The goal of this assignment is to present a clear white paper. Your white paper should be between 4-5 pages in length not including your references.
You will need to:
1) Identify a cyber related issue that requires closer examination.
2) Clearly state the problem.
3) Explain why this is an important issue. How will further research and solution assist with mitigating the effects of this issue?
4) Offer a set of solutions, with an optimal solution for recommendation.
Format. Your paper should have a 1-inch border on all four sides, use Times New Roman-12 point font, be double spaced, and not have an extra space in between paragraphs. All references and citations are in Chicago Turabian format.
Introduction/Synopsis. Identify and introduce your key issue. Provide a succinct synopsis of the problem and why the issue merits further discussion and resolution.
Background/Problems. Outline the scope of the issue and provide background information to orient your audience. The focus of this section is to orient a decision-maker to key issues in order to facilitate the resolution of the problem on an understanding of the facts that you identify.
This section should be supported by evidence-as opposed to opinion. It is imperative that you do not shift from the main topic and pose issues that cannot be resolved.
Solution. Propose a set of solutions with pro’s and con’s to each. Recommend the optimal solution.
Conclusion. Write a conclusion in order to wrap up the white paper and enhance your readers’ understanding.
References. Include any references in a separate Reference Page.
CLASSIFICATION: UNCLASSIFIED
Solution Preview
Cyber systems are increasingly becoming a primary resource for successful engagement in business activities. In particular, organizations and individuals have increasingly become dependent on the internet of things as a means of integrating different factors of communication. Improvements in the technology available and consequent development of various device applications has led to innovation in means of gathering user data for various cyber systems, leading to some individuals engaging in activities that significantly compromise the integrity of the systems. In particular, ransomware forms one of the most significant threats to cyber security in contemporary society, with the consequent exploitation of user data leading to hackers using the information to make changes on the users’ hardware, and seek compensation to restore the devices to functionality.
(1,253 words)