During the semester, please follow the instructions located in course modules to submit individual milestone assignments via Blackboard for grading. Details and instructions for each project stage will be provided in the assignment items in Blackboard. Please provide your submissions for each of the milestones in one cumulative file. For example, when you submit your executive summary, add it to your topic section as opposed to creating an entirely new document. We would like your submissions to be cumulative versions of an evolving draft research paper. In other words, each submission is cumulative. For example, first submission: topic; and second submission: topic and executive summary draft.
The theme for the Research Paper: Each student is requested to give credit to prior work. Limited extracts from prior work with attribution (e.g., footnotes) are acceptable. However, you are responsible for the accuracy and currency of all work in the paper. The components of a research paper generally include ExecutiveSummary; Introduction, Context; Body of the Paper; Cases; Summary; Analysis (with respect to research paper purpose); Conclusions; Matters for Research; and Annotated Glossary.
Please note that an important part of each research paper is the context to provide an overarching framework for the topic. For example, for a research paper on Smart Grid security, context could be provided that includes consideration c.
A central issue concerning the potential migration of attacks from non-control (enterprise) systems to control systems is presented as Logical Interface Category 10: NISTIR 7628, Rev. 1: Guidelines for Smart Grid Cybersecurity: Volume 1: Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements, September 2014, Section 2.3.6: Logical Interface Category 10: Interface between control systems and non-control/corporate systems.
Note: LIC 10 is updated within the context of Draft NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0, July 2020. Appendix H: Logical Interface Categories from NISTIR 7628; and Appendix I: Types of Exchange between Entities in the High DER [Distributed Energy Resources] Example.
Research Paper Demonstration of Knowledge: In general, a comprehensive demonstration of knowledge for a research paper for this course requires a minimum of 45 pp. plus annotated glossary.
Use of graphics (with attribution) is encouraged, e.g., figures and tables. Specific directions and instructions for this assignment will be provided within the course modules.
Please consider as appropriate IAA concepts, such as provided in 2021 (to be made available via an announcement):
NIST Operational Guidance: DHS and FDA Could Consider NIST Zero Trust Architecture and Continuous Diagnostics and Mitigation with AI/ML, Version 0.9.6, January 24, 2021.
Harold J Podell, Johns Hopkins University
Note: Comprehensive Demonstration of Knowledge Example: A comprehensive demonstration of knowledge is encouraged. For example, as introduced, if the term IPsec (Internet Protocol Security) is used, an integrated context could be provided. NIST and the IETF (Internet Engineering Task Force)provide this context.[1]
Annotated Glossary for the Research Paper: Explain: 10-20 IA terms that are used in the research paper. Conceptually, this is similar to focused homework with attribution (e.g. footnotes).
If, after submitting the final research paper you are not satisfied with the grade received, you are encouraged to coordinate with your instructor, who will provide suggestions for revision, and resubmit it. If the resubmission results in a better grade, that grade will be substituted for the previous grade.
A core purpose of the research paper is to assist you in developing high-quality research that is based on the best available knowledge for the selected topic.
At the end of the semester, please submit your research paper for grading via the link in Module 14. As introduced, this submission is the cumulative result of developing a file for the Milestones for the Research Paper.
[1] As introduced, RFC 6071: IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap (February 2011).