Note: Assigned country is China Background: It is time to pick a new Senator. Th

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Note: Assigned country is China
Background: It is time to pick a new Senator. Th

Note: Assigned country is China
Background: It is time to pick a new Senator. The state of New Jersey is concerned that their elections are not secured. You are hired as a cybersecurity consultant to provide them with actionable intelligence about if this is something they should be concerned with, and what they can do. The budget is of no concern.
Objective: Perform a detailed investigation of a designated country’s cyber capabilities, especially focusing on state-sponsored activities, using both current events and scholarly sources. Apply this research to devise a protective strategy for a state’s voting infrastructure in New Jersey, against cyber threats potentially posed by the assigned country.
Instructions:
Country Research: Investigate your assigned country’s recent cyber activities and capabilities. Focus on identifying the tools, techniques, and strategies used by state-sponsored cyber attackers. Incorporate a variety of sources in your research, ensuring to include at least two peer-reviewed articles. Please do not use sources older than 10 years. For more information regarding your assigned country, please check on groups under the people link.
Peer-Reviewed Articles: Understand that peer-reviewed articles are scholarly papers reviewed and validated by experts in the same field. These articles, found in academic journals and databases, provide reliable, high-quality research and are crucial for your analysis. If you are not sure what a scholarly article is, please reach out to the Librarians for assistance.
Current Events Analysis: Analyze recent global cyber incidents, specifically those attributed to your assigned country. Utilize respectable news outlets for current events. Please do not use sources older than 5 years. Identify tools, technologies, methods, and prevalent tactics used by the attackers, combining this information with insights from peer-reviewed research.
Application to Election Security: Hypothesize how the identified cyber tactics could be applied to disrupt or manipulate an election in New Jersey. Examine all aspects of election infrastructure, such as campaigns, voter databases, vote-counting systems, and websites that display the results.
Mitigation Strategies: Formulate a comprehensive set of practices and recommendations to safeguard New Jersey’s voting infrastructure. Your strategy should be informed by your research findings and cover both technical and non-technical aspects of cybersecurity.
Report and Conclusion: Present your research, analysis, and strategies in a structured report. It should include:
An introduction to the country’s cyber capabilities based on your research.
Analysis of potential threats to election infrastructure.
A detailed mitigation plan based on the threats identified
Analytical Conclusion: Conclude with a paragraph analyzing the motivation and likelihood of your assigned country targeting elections. This should be your well-reasoned opinion, based on your research findings. No citations are needed for this part, but your argument should be logical and reflect the evidence and insights gathered during your research.
Expectations:
Depth and Quality of Research: Your analysis should be grounded in robust research, with an emphasis on peer-reviewed sources supplemented by current events.
Realistic and Informed Threat Assessment: Ensure your threat assessment is plausible, and informed by your research findings.
Comprehensive Mitigation Strategy: Develop a thorough, multifaceted approach to protecting election infrastructure.
Cohesive and Logical Conclusion: Your concluding paragraph should logically interpret the motivations and likelihood of cyber-attacks based on the evidence you have gathered, showcasing your analytical skills.
Important Notes:
Pay attention to grammar and spelling; errors will affect your grade.
Please turn in a properly formatted document.
Treat these documents as professional work, as if submitting them to your boss.
Failure to cite sources will lead to a score of zero due to plagiarism. Remember, accidental plagiarism is still plagiarism!
Although generative AI can be used as a tool to support learning (e.g., in obtaining feedback or generating ideas), work submitted by a student should be that of the student and not the work of an AI system. If you include material generated by an AI program, it should be cited like any other reference material. Ultimately, the student bears responsibility for any inaccuracies or misinformation. If you have questions about how AI may be used to complete assignments within the scope of this academic integrity policy, please reach out to your instructor.
Election Hacking
Criteria
Ratings
Pts
This criterion is linked to a Learning Outcome Introduction
2 pts
0 pts
2 pts
Full Marks
No Marks
This criterion is linked to a Learning OutcomePotential Tactic/Tool #1
2 pts
0 pts
2 pts
Threat (1 point)
Full Marks
No Marks
Proof that the country has used this
This criterion is linked to a Learning OutcomePotential Tactic/Tool #2
2 pts
0 pts
2 pts
Full Marks
No Marks
This criterion is linked to a Learning OutcomePotential Tactic/Tool #3
2 pts
0 pts
2 pts
Full Marks
No Marks
This criterion is linked to a Learning OutcomeMitigation Strategy
6 pts
0 pts
6 pts
Must address all 3 threats that were identified
Full Marks
No Marks
This criterion is linked to a Learning OutcomeConclusion
3 pts
0 pts
3 pts
Full Marks
No Marks
This criterion is linked to a Learning OutcomeReferences
3 pts
0 pts
3 pts
Must include a minimum of 5 references. Two of these references must be from a peer-reviewed article. Please keep in mind, Wikipedia is not an acceptable reference
Full Marks
No Marks
Total Points: 20

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount