Provide a history of system attacks that either targeted or used the Operating System. Include the magnitude of the attack and what eventually happened to the perpetrator.

The report will be a minimum of 8 double spaced pages of text. Figures, tables, and graphics do not count for the page count. While I encourage their inclusion for overall understanding, you cannot submit a document that contains all pictures. This page count does not include front or back matter. Front matter would be a distinct title page, table of contents, table of figures, abstract page, executive summary (you do not need any of these but are free to include them), and similar material in the front. Back matter would be appendices, end notes, and similar material at the back. The text will use a standard 12-point font and use 1” margins on all sides.

You must have at least three authoritative sources. A web page citation is not normally considered a credible, reviewed, authoritative, source. An interview with a non-expert is not a credible, reviewed, authoritative source. The sources are to be cited in the document and listed in an annotated bibliographic entry using MLA formatting. I encourage the use of footnotes to make a point that is not part of your argument. In MLA, the annotation starts on a new line beneath the bibliographic entry it applies to and does not contain a title. And just to be clear, while the paper is double spaced, references and bibliographies are not. All sources obtained from an online source require a link and access date. You may use footnotes or end notes for any citations in your paper. If you cite a source, then it must also be in the bibliography. That means that the list in the bibliography will be at least as long as the list in the sources cited. At the end of the bibliography, you must also evaluate one of the authors listed. You must evaluate the author for whether or not they are qualified to write on the topic they wrote about.

Preliminary Research sources (please use 3 authoritative sources):

The Morris Worm (1988)
https://www.fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218
https://spaf.cerias.purdue.edu/tech-reps/823.pdf

The WannaCry Ransomware Attack (2017)
https://www.cisa.gov/news-events/alerts/2017/05/12/indicators-associated-wannacry-ransomware
https://arxiv.org/abs/1709.08753

The Stuxnet Worm (2010)
https://www.enisa.europa.eu/publications/info-notes/stuxnet-malware-analysis

SQL Slammer Worm (2003)
https://vuls.cert.org/confluence/display/historical/CERT%2BAdvisory%2BCA-2003-04%2BMS-SQL%2BServer%2BWorm
https://www.caida.org/archive/sapphire

Ace Your Assignments! πŸ† - Hire a Professional Essay Writer Now!

Why Choose Our Essay Writing Service?

  • βœ… Original writing: Our expert writers will write each paper from scratch, ensuring complete originality, zero plagiarism and AI free content.
  • βœ… Expert Writers: Our seasoned professionals are ready to deliver top-quality papers tailored to your needs.
  • βœ… Guaranteed Good Grades: Impress your professors with outstanding work.
  • βœ… Fast Turnaround: Need it urgently? We've got you covered!
  • βœ… 100% Confidentiality: Customer privacy is our number one priority. Your identity is anonymous to our writers.
πŸŽ“ Why wait? Let us help you succeed! Our Writers are waiting..

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.