skip to Main Content

Step 1: Place your order

Fill in the order form and provide all details of your assignment.

Step 2: Proceed with the payment

Choose the payment system that suits you most.

Step 3: Receive the final file

Once your paper is ready, we will email it to you.

This is a Cybersecurity research paper for a CSIA 459 class. Below are the inst

Get Help With Your Essay

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

For This or a Similar Paper Click To Order Now


This is a Cybersecurity research paper for a CSIA 459 class.
Below are the instructions. I have also attached the attached detailed assignment description for the Open
Source Intelligence Tech Research Project.
There is also a CSIA research paper template file attached.
Source Intelligence Tech Research Project
The purpose of this
Open Source Intelligence (OSINT) Project is to use publicly available sources
of information to investigate an emerging application of technology and then
prepare a report suitable for dissemination to interested parties in business
and government (subscribers to a threat intelligence reporting service).
Your task is to develop an OSINT report
which provides information about the characteristics of an emerging application
of technology and the threats / attacks to which it may be vulnerable. The consumers
of this report have an interest in developing suitable countermeasures to
prevent attacks by a broad spectrum of attackers from hobbyists to
quasi-professionals and criminal entities to well organized, nation-state
sponsored groups. When possible, your OSINT should explore the types and
identities of known attackers who are likely to target users and usages of the
technology covered by your report.
The basic question that must be
answered in your OSINT report is:
what are the cybersecurity implications (good or bad) of a specific emerging
application of technology?
For this assignment,
your role is that of a threat intelligence research intern working for a threat
intelligence provider (private company). Your audience for this report will be subscribers
to a cybersecurity threat intelligence reporting service provided by your
employer. These subscribers are primarily senior managers and executives in
businesses and government organizations.
The high-level visibility
for your deliverable means that, in addition to easily accessed web sources and
social media, your research must also include research-based journal articles,
papers published in conference proceedings, and doctoral dissertations. Threat
research and intelligence reports published by mainstream companies, e.g.
Verizon, Forrester, Deloitte, etc., should also be considered for use as
primary sources for your OSINT report. See step #3 under Conduct Your OSINT
Research (below) for additional information about how many sources are required
and what types of sources are allowed.
The following
information needs, previously identified by your company’s threat researchers, must
be met by the deliverable for this assignment.
and description (characteristics) of the
Potential or known uses of the
technology to support or improve business operations of companies and
government agencies; this includes development of products which incorporate
the technology and potential or known uses of the technology to support or
improve cybersecurity, i.e.
uses of the technology to reduce or
manage risk
uses of the technology to increase
resistance to threats/attacks
uses of the technology to decrease
vulnerabilities in an existing technology application
potential or known uses or exploitation
of the technology by attackers, criminals, terrorists, etc. to accomplish their
Format your
deliverable as a research report. Your report should include the following
page with author and date
Table of
Contents (also Table of Figures if graphics are used)
Description and Usage Analysis
and Conclusions
Choose an Emerging Application of Technology
To begin, choose an
emerging application of technology. Applications of
technology that are currently in the emerging
stages include:
5G/6G Telecommunications Technologies
& Implementations (Networks)
Artificial Intelligence
Autonomous Vehicles (ground, sea, or
Blockchain Technology
Data Science
Deep Space Communication Networks
Implantable Medical Devices (including
brain, prosthetics, medication delivery, cardiac support, etc.)
Infrastructure for Smart Cities
(surveillance, monitoring, traffic control, utilities, etc.)
Internet of Things (especially
Operational Technology)
Internet of Things Devices in Smart
Homes / Smart Buildings
Machine Learning
Nano machines
Neuromorphic computer chips
Physical Unclonable Functions (PUFs)
(devices & electrical circuits)
Precision Agriculture (integrated
systems using satellite imagery, GPS, Sensors, Robots)
Robot inspectors for physical
infrastructures (buildings, roads, railways, pipelines, etc.)
Wearable Sensors for Hazardous Materials
Detection (e.g. CBRNE): Emergency Services Sector
You are encouraged to look for and
investigate additional appropriate technologies before deciding upon your
technology choice for this assignment.
If you decide to research a technology
that is not on the suggested technologies list (see above) or included in the
course readings, you must first request and receive your instructor’s
permission. Your instructor may require
that you do preliminary library searches for research papers and technical
papers to prove that you can find a sufficient number of resources to complete
the assignment.
Conduct Your OSINT Research & Information
Step 1. Review this UMGC library guide to help you
evaluate sources for your OSINT Research:
Step 2. Brainstorm keywords that you can use to help
find Internet sources of information about your chosen technology. You can also
search for and review articles and postings in well known cybersecurity
industry blogs, news articles, and social media accounts. See
for lists of resources. You must find
and use at least five different sources in this category (Internet sources).
Step 3. Use your initial set of sources to develop
additional keyword lists to use in searching the UMGC library databases for
professional journal articles, papers, and other scholarly publications
(“sources’) which discuss your chosen emerging application of technology. You must find and report on five (5) or more
Open Sources which you obtained from Internet web pages, social media, etc. You
must also find and report on an additional five or more Open Sources which you
obtained from databases which index professional and academic papers (see
if you are not sure what this means). The following UMGC library and/or freely
available Internet databases are known to have suitable professional and/or research-based
articles which meet the “databases” as source requirement:
ACM Digital Library
Dissertations & Theses (Pro Quest)
IEEE Computer Society Digital Library
Research Gate
(required free account to access papers)
Science Direct
Since the point of this OSINT search is
to find information about emerging
applications of technology, your sources must have a publication date of 2017
or later (2017, 2018, 2019, 2020, 2021). For papers indexed in Science Direct,
you may also use papers that are marked “In Press.”
When you have finished your research for this assignment,
you should have 15 or more well chosen, high quality, authoritative resources
which you will use to meet the content requirements of this project. At least 5
of those resources must be from the professional literature, i.e.
peer-reviewed journal articles, government or corporate documents or reports,
trade publications, etc. See
for additional information about evaluating sources.
5. Decide if you need to add images or not (including
pictures, charts, graphics, etc.). If you do include images, you must make sure
that each such item has a caption and that the caption includes the in-text
citation for the source of the image (add the source to your list of
references). The image must be readable (in focus, not blurry) and of an appropriate
size. Any image or picture used MUST significantly add to the content and help
the reader to understand your analysis. Do not add gratuitous imagery (no “eye
candy” or decorative images). Do not add images just to increase your page
Note: if you have captioned items, you must include a Table
of Figures after your Table of Contents.
It All Together
Consult the
grading rubric for specific content and formatting requirements for this
Your 8 to 12 page
OSINT report should be professional in appearance with consistent use of fonts,
font sizes, margins, etc. You should use headings and page breaks to organize
your paper. Title page, table of contents, and reference list do not count
against the page count. Remember that your audience will benefit more from a
clear, concise, and accurate presentation of information. Adding extra content
just to artificially meet a page count (or exceeding the recommended length by
adding filler) will not improve your grade.
Your paper should
use standard terms and definitions for cybersecurity.
The CSIA program
recommends that you follow standard APA formatting since this will give you a
document that meets the “professional appearance” requirements. APA formatting
guidelines and examples are found under Course Resources. An APA template file
(MS Word format) has also been provided for your use. CSIA_Paper_Template(TOC+TOF,2021).docx.
This file has the style gallery set up so that you can use the built-in
features of MS Word to generate a Table of Contents and, if needed, a Table of
Your submitted
file must include a separate cover page at the beginning which provides the
assignment title, your name, and the due date. Your reference list must begin
with a new (separate) page at the end of your file.
You are expected
to write grammatically correct English in every assignment that you submit for
grading. Do not turn in any work without (a) using spell check, (b) using
grammar check, (c) verifying that your punctuation is correct and (d) reviewing
your work for correct word usage and correctly structured sentences and
You are expected
to credit your sources using in-text citations and reference list entries. Both
your citations and your reference list entries must follow a consistent citation
style (APA, MLA, etc.).
See the
“Examples” section (below) for information about how to create a Table of
Contents and Table of Figures. The built-in help for MS Word will also walk you
through creating these content elements for your OSINT report.
Table of Contents
Objective. 1
Overview.. 1
Instructions. 2
Choose an Emerging Application of Technology. 2
Conduct Your OSINT Research & Information
Acquisition. 3
Putting It
All Together. 4
Examples. 5
References. 7
The Table of Contents (TOC) above was generated using MS
Word’s References > Table of Contents feature (see Figure 1).
You must use the headings styles from the Style Gallery in order to have the
TOC generated for you.
The Table of Figures (References > Insert Table of
Figures) requires that you use the Style Gallery’s “caption” style. An example
of the Style Gallery window is shown in Figure 2.
When using Heading or Caption Styles in the Style Gallery,
you can (should) change them to Black Font, 11 or 12 point, and add space
before and after. Use the help feature in MS Word if you do not already know
how to make these changes.
Figure 1. Reference Tab in MS Word (Microsoft,
Figure 2. Style Gallery in MS Word (Microsoft,
Microsoft. (2021). Microsoft Word (Office 365). Redmond, WA:

For This or a Similar Paper Click To Order Now


What We Can Do For You

Academic Essays

Get essays written on whichever topic or subject you require tailored by our essay writing experts. You will be furnished inventive and ingenious essays fashioned step by step on your directives.

Research Paper Writing

We proffer 100% original and plagiarism free research papers. We acquire highly qualified writers who are expert researchers as well. Every paper is well researched and formatted just like you yearn.

Help With Homework

No need to fret about your homework anymore. As we bring to you the most trustworthy and affordable professional homework help service ever. Procure essays written with perfection and professionalism.

Assignment Writing

Are you struggling with assignment writing? We are here to take away your entire academic burden. Be it high school, college or universities all academic level help is imparted with the assurance of premium quality.

Why TheScholarEssay?


    • Premium quality 100% original academic document
    • Free unlimited revisions to further polish and refine your academic document
    • Proper format and citation used.



    • Academic document 100% free of plagiarism
    • Every document is a custom product written from scratch, constructed entirely on the client’s instructions
    • Highly certified professional writers having good command over English language are hired.


    • Most affordable prices for the best custom written academic papers
    • Our client support service is at your service round the clock!
    • Safe and secure payment gateways used
    • Privacy and confidentiality of client’s safe guarded and will certainly not be revealed to a third party.
Back To Top