You have been charged with overseeing the implementation of cybersecurity best practices for EnergyA. In this course, you examined 10 design and security principles (Deception, Separation, Diversity, Commonality, Depth, Discretion,

You have been charged with overseeing the implementation of cybersecurity best practices for EnergyA. In this course, you examined 10 design and security principles (Deception, Separation, Diversity, Commonality, Depth, Discretion, Collection, Correlation, Awareness, Response) in the context of national and critical infrastructure protection. Identify any two security principles from the 10 we learned and evaluate and discuss how it can be applied to EnergyA. Your case analysis needs to minimally address the following  The relevance of cybersecurity in the energy sector  Existing research on cybersecurity practices in the energy sector  Why you are focusing on the specific two security principles  For each security principle, identify its relevance in the energy sector  For each security principle, identify how the principle can be implemented  For each security principle, identify challenges presented in implementing it  Discussion that connects your entire analysis with the topic and future implications of cybersecurity in the energy sector Your research paper should be minimally 10 pages (double space, Font – Georgia with font size 12). The research paper needs cite at least 5 peer reviewed journal/book references. The bibliography should be included as a separate page and is not part of the 10 page requirement. Student assignments will be run through Safe Assignment. ensure to check the safe assignment result prior to submitting. You will have the chance to submit your assignment up to two times. So submit earlier than the due date so you can check your safe assign score. You need to check your safe assign report to ensure there is no instance of academic integrity violations. refer to this link for information on the academic integrity policy at the university https://cumberland.smartcatalogiq.com/en/2017-2018/2017-2018-Undergraduate- Catalog/Academic-Affairs/Academic-Integrity-Policy ensure to review the policy. If there are instances of academic integrity policy violations in your paper, you will not receive a grade for the assignment and will be referred to the department. The university of Cumberland library can be assessed at https://www.ucumberlands.edu/library The research paper should include the following components.  Title Page (Not part of the minimum 10 page requirement)  Abstract (quick overview in your own words of the entire content of your paper, limited to 200-350 words)  Introduction (1-2 pages, relevance of cybersecurity in the energy sector)  Literature Review (2-4 pages, describes the research papers that you find in reference to the topic of cybersecurity in the energy sector)’  Cybersecurity Implementation (2-4 pages, Why you are focusing on the two specific security principles; For each security principle, identify its relevance in the energy sector; For each security principle, identify how the principle can be implemented; For each security principle, identify challenges presented in implementing it)  Discussion (2-3 pages) – (Your perspectives on the topic, try to connect the security principles identified together; discuss future implications of cybersecurity in the energy sector)  Conclusion (1-2 paragraphs, This provides a final summary of your research paper)  Bibliography in APA format Purchase the answer to view it

Do you need us to help you on this or any other assignment?


Make an Order Now