Sign In
Not register? Register Now!
Pages:
11 pages/≈3025 words
Sources:
10 Sources
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 80.19
Topic:

Threats to Maritime Critical Infrastructure: Maritime Cyber Security

Research Paper Instructions:

Introduction, Research Study Question, and Hypothesis (1-2 pages): This section shall provide an overview of the topic that you are writing about, a concise synopsis of the issues, and why the topic presents an area of study suitable for graduate study. Critical to this section is your hypothesis which should conclude the introduction section.
Literature Review (4-6 pages): All research projects include a literature review to set out for the reader what knowledge exists on the subject under study and helps the researcher develop the research strategy to use in the study. A good literature review is a thoughtful study of what has been written, a summary of the arguments that exist (whether you agree with them or not) and are arranged thematically. The literature review is not an annotated bibliography and should be written in coherent narrative style, grouped by subject area which provides a synthesis of the body of knowledge. At the end of the Lit Review summary, there should still be gaps in the literature that you intend to fill with your research.
Methodology (1-2 pages): This section provides the reader with a description of your research methodology. It is not enough to simply state that you are using "qualitative" methods. I want to know the SPECIFIC type of method employed. Case Study? ACH? etc. If you have any questions regarding this section seek additional reference support from the library. Constructing a solid academically rigorous methodology section will enhance the skills you will need to execute a successful thesis.
Analysis (2-3 pages): This section is not simply a summary of the references you developed nor is it the same as conclusions. In the analysis component of this section you identify how you analyzed the data.
The second part is the finding you got from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. These actions are at the very core of graduate level research that interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. While there may be some facts that are such that they will stand and translate to your paper, the intent is to create new knowledge, so you will normally analyze the data to create your own findings of what facts that data represents.
Conclusions and Recommendations (2-3 pages): This section is where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what that researcher sees as the meaning of that data, their conclusions. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole.
References: This section will contain all references, cited in APA format and alphabetically arranged. Your paper must contain a minimum of 10 reference sources with at least 6 of them being peer-reviewed journals or products of Think Tanks such as RAND, Brookings or Heritage. Entitle this section as "References" following the parenthetical and reference citation format style within APA. You should be compiling sources and adding to them as you gone along throughout the semester. They should be error free!!!
Technical Requirements
Scholarly and credible references should be used.
A minimum of 10 outside references, 6 of which MUST be peer-reviewed is required.

Research Paper Sample Content Preview:

Threats to Maritime Critical Infrastructure: Maritime Cyber Security
Name
Department
Course
Instructor
Due Date
Threats to Maritime Critical Infrastructure: Maritime Cyber Security
Cyber security protects computer systems against unauthorized access and intervention or access while applying technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks. Maritime cyber security can potentially affect ships, other maritime vessels, maritime infrastructure shipping companies, port operators, and maritime platforms. The maritime navigation systems are connected to technology to ease communication, navigation, and propulsion. Maritime mainly represents ships, offshore structures, infrastructure, yachts, and other floating vessels at sea and includes everything else that connects the aforementioned things (Mraković &Vojinović, 2019).  Despite the need to improve maritime cyber security, the topic has not been widely researched (DiRenzo et al., 2015). Furthermore, the maritime industry's low or lack of cyber security awareness is a concern because of lax cyber security measures and risk management strategies. 
 Increasingly, port operations are integrated with computer networks, digital and technology systems, and maritime cyber security is affected by different vulnerabilities that an attacker could exploit. The coronavirus pandemic (Covid-19) necessitated changes in the maritime industry where ships have increased remote access and remote inspection. However, this may also increase vulnerability to cyber-attacks. Human beings remain the weakest link to cyber security, and it is essential for crew members seafarers to receive cyber security training to identify and report cyber incidents (DiRenzo et al., 2015).
Preventing, identifying, and documenting unusual and suspicious activities and threats associated with the maritime cyber environment is necessary to improve maritime cyber security. Different attacks target a system or parts of the system. Advanced persistent threats (APT) is one of the most concerning a that are well-coordinated, and attackers gain unauthorized access to a network and remain undetected for a prolonged time. While maritime port operations have long focused on physical safety, the threat of maritime cyber security poses new challenges and risks and can potentially affect maritime operations (Progoulakis et al., 2021). Cyber vulnerabilities in the US maritime infrastructure indicate gaps making it harder to prevent cyber incidents and threats. Ports rely on different networked technologies to communicate and operate facilities, but digitization also leaves facilities vulnerable to cyber attacks. Nonetheless, ports are integral to the networked systems; there has been more focus on securing them physically and n cyber security than other critical maritime infrastructure elements. 
This research aimed to determine the threats to critical maritime infrastructure and maritime cyber security. It was hypothesized that the lack of cyber-security awareness undermines cyber security resilience and increases the risk of attacks on critical maritime infrastructure. Cyber security training awareness is essential t...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Research Paper Samples: