American Military University
14 Mar 2021
Research Proposal on Cybersecurity
In the global world today, the protection of intellectual property, curbing terrorism, and stop any form of threat by use of technology have become such important concepts. However, with increased emerging threats and cyber insecurity, the US continues to face a lot of challenges as far as terrorism is concerned. Many of the business organizations in the US and other parts of the world have recently struggled to keep their properties and people safe because of the increasing emerging trends and technological advancement.
The Project Objective
The research will look into the fundamental challenges, the emerging trends, and the technological advancement that has continued to pose serious risks to the United States National Security. We will as well look at the malware that usually targets security as well as the payroll which can be modified to access personal information illegally through credit cards.
Scope of the Project
The research will focus on the address to the cybersecurity challenges and understanding the sources of emerging trends and technological advancement. The proposal, therefore, predicts some of the challenges we face and the ways in which various businesses and organizations can prevent their people from these scrupulous people.
Many businesses and organizations in the US have faced various forms of cybersecurity attacks. These attacks have become a point of concern to the United States National Security. What follows is a set of questions that will be addressed in this particular research proposal.
1. Does cybersecurity affect the business organization’s performance in the US?
1. Is it possible that the efficiency of National Security Agencies can reduce the cases of cybersecurity breaches?
2. Is there a relationship between the level of technological advancement by the Security Agencies in combating emerging trends and technological advancement?
3. Can the internal audit of the systems in place now help in reducing the cybersecurity breaches?
4. What would be recommended in the wake of increased emerging trends and technological advancement?
Boys, J. D. (2018). The Clinton administration’s development and implementation of cybersecurity strategy (1993–2001). Intelligence and National Security, 33(5), 755-770. Retrieved from https://www.tandfonline.com/doi/abs/10.1080/02684527.2018.1449369
England, S. K. (2020). Internet of Things Device Cybersecurity and National Security (Doctoral dissertation, Utica College). Retrieved from https://search.proquest.com/openview/5d7b256576c5ad12d394c8719f1f3c15/1?pq-origsite=gscholar&cbl=18750&diss=y
Sayler, K. M. (2019). Artificial intelligence and national security. Congressional research service report R45178. Retrieved from https://www.everycrsreport.com/files/20191121_R45178_ddbcce24a6fbf02ad9e81387b5623295ac60f017.pdf
Sanchez, S., Mazzolin, R., Kechaoglou, I., Wiemer, D., Mees, W., & Schrogl, K. U. (2020). Cybersecurity space operation center: Countering cyber threats in the space domain. In Handbook Space Security (pp. 921-939). Springer. Retrieved from https://link.springer.com/content/pdf/10.1007/978-3-030-23210-8.pdf#page=922
Sivan‐Sevilla, I. (2019). Complementaries and contradictions: National security and privacy risks in US federal policy, 1968–2018. Policy & Internet, 11(2), 172-214. Retrieved from https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.189
Trump, D. J. (2017). National security strategy of the United States of America. Executive Office of The President Washington DC Washington United States. Retrieved from https://apps.dtic.mil/sti/citations/AD1043812
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more