Your Perfect Assignment is Just a Click Away

Starting at $8.00 per Page

100% Original, Plagiarism Free, Customized to Your instructions!

glass
pen
clip
papers
heaphones

Write a 175- to 265-word response to the following questions: How will a project schedule and a project budget help you manage health IT projects? What can happen if you don’t have either? Provide examples.

Write a 175- to 265-word response to the following questions: How will a project schedule and a project budget help you manage health IT projects? What can happen if you don’t have either? Provide examples.

Cyber Security Department

Graduation Project (407422)

Project Title Here ….

Submitted By:

 

Student Name

 

Student ID

 

Name 1

 

Id1

 

Term:

 

Date:

 

Table of Contents

1. Introduction 5

2. Problem Statement 5

3. Background 5

4. Requirements and specification 5

4.1. User Groups 5

4.2. Functional Requirements 6

4.3. Non-Functional Requirements (NFRs) 7

5. System Design 10

5.1. Solution Concept 10

5.2. Proposed System Architecture. 11

5.2.1 Alternative 1. 11

5.2.2 Aternative 2. 11

5.2.3 etc 11

5.2.4 Production and Staging Environments 13

5.3. Component Design. 13

5.3.1 Hardware Components 13

5.3.2 Software Components 13

5.3.2.1 User Interface – Web client 13

5.3.2.2. Use Case Description. 13

5.3.2.3. Back-End Database. 14

4.4. Design Evaluation. 15

6. Implementation 16

6.1 System Implemented Architecture. 16

6.1.1. Tier Two – Application Server and Web-Server 16

6.1.1.1. The Web-Server 16

<<if needed>>. 16

6.2 Access Levels 16

6.3 System Services or Functionalities 16

7. Testing, Analysis and Evaluation 17

7.1 Testing Methodology. 17

7.2 System Analysis and Evaluation. 17

7.3 Test Execution and Test Results 17

7.3.1 Integration Testing. 17

7.3.2 Functional Testing. 17

7.4 Examples on testing. 18

7.4.1 Check password Strength. 18

<< this might be an example of testing password strength>>. 18

8. Issues, Engineering Tools and Standards 18

8.1. Issues 18

8.2. Engineering Tools and Standards 18

9. Teamwork 18

10. Conclusion 20

10.1. Conclusion. 20

10.2. Future Work. 20

Appendix A: Test Plan 21

Appendix B: Progress Report-Teamwork 22

Appendix C- Attachments and Source Code 24

References 25

 

List of Figures

Figure 5 Use-Case Diagram.. 12

Figure 7 High Level Implementation Architecture. 15

Figure 14 Security Domains Access Levels. 15

List of Tables

Table 1 User Groups. 5

Table 2 Non Functional Requirements. 7

Table 3 System Use Case Description. 12

Table 4 Comparing On-Cloud and On-Site Options. 14

Table 7 Team responsiblites, Contributions, and expertise. 18

 

1. Introduction
Systems and workstations that are running Microsoft Windows but have not been patched against the vulnerability that is known as “Eternal Blue” are susceptible to having their data stolen if the vulnerability has not been patched. A vulnerability is a fault in a computer system that, when exploited, could compromise the device’s or system’s level of security (Ding, et al., 2019). After the security flaw has been exploited, the hacker will be able to steal information, which will result in a data breach. The SMBv01 protocol that is utilized by Windows systems is the target of the vulnerability known as Eternal Blue.

Techniques such as heap spraying and buffers overrun are utilized throughout the attack in order to gain access to systems and devices that are powered by Windows operating systems. Notably, this vulnerability was exploited in the WannaCry ransomware attack that occurred in 2017, which encrypted the files of victims and demanded a ransom in order to decrypt the information. After it was initially launched, the attack would quickly spread to other systems, delivering corrupted data that would be processed via the SMB protocol. It is inside this protocol that the vulnerability can be located. After a hack by a group of hackers known as the Shadow Brokers in 2017, who broke into a cache of cyber weapons kept by the National Security Agency (NSA), the origin of the eternalblue vulnerability was discovered to be the United States National Security Agency (NSA).

2. Problem Statement
Any company or organization worth its salt recognizes that data and information are among its most valuable assets. A hack of a successful corporation’s data and information might easily bring the organization to its knees. A data breach occurs when an unauthorized entity is able to access information from an individual, an organization, or a system. A data breach can also refer to the act of stealing information. A data breach occurs whenever there is unauthorized access to data, regardless of whether or not the information is utilized inappropriately. Systems and workstations that are running Microsoft Windows but have not been patched against the vulnerability that is known as EternalBlue can have their data compromised if the vulnerability has not been addressed. They are able to insert a variety of code referred to as a “RAT,” which gives the hacker complete control of the device that has been compromised. Even further, it is able to propagate and proliferate over all of the devices that are connected to the same network.

A vulnerability is a fault in a computer system that, when exploited, could compromise the device’s or system’s level of security (Ding, et al., 2019). After the security flaw has been exploited, the hacker will be able to steal information, which will result in a data breach. The goal of this project is to make users more aware of an exploit known as eternalblue and to identify steps that users may take to protect their data and information from being compromised by a data breach caused by eternalblue. A comprehensive explanation of how the vulnerability can be exploited will be provided, along with recommendations for mitigating its effects and safeguarding the affected devices and systems.

3. Background
Numerous researchers have conducted in-depth investigations into the roles that each player played in the development and propagation of the virus that was responsible for the deadly hack. It is possible to cast a wide net of blame on Microsoft’s insecure protocol, Russia’s use of the malware, and the business I.T. professionals within organizations that failed to apply the available patch to all of their compromised systems; however, when analyzing the role of the NSA, journalists primarily focus on what factors contributed to the data breach and what measures could be taken to prevent future leaks. Microsoft’s unsecure protocol was one of the factors that contributed to the data breach. Russia’s use of the malware was They come to the conclusion that the failure of the NSA to protect its secrets, which includes the hacking tools it uses, is the primary source of worry for which the institution must be held accountable. Greenberg exposes the absurdity of the United States’ habit of shifting responsibility for its problems onto former administrations and other nation-states around the world, as he does in his discussion of the WannaCry attack.

Ransomware attack directed on North Korea, without first looking inwards. He draws attention to the policies and procedures at the workplace that enabled two NSA employees to take substantial collections of highly sensitive hacking equipment home with them. One of the employees’ personal PCs reportedly used antivirus software made by Kapersky, a Russian security business. This indicates that the malware crafted by the NSA was uploaded to the corporation’s servers and remained there for an undetermined amount of time. The reporter also brings up the hazy language and the lack of transparency in the implementation of the White House’s Vulnerabilities and Equities Process. This is a document that is intended to guide which vulnerabilities are reported to the associated vendors and which are kept secret to gather foreign intelligence. However, the reporter notes that the document’s language is hazy and that there is a lack of transparency in its implementation (Greenberg, 2017).

The reporting done by Shane, Perlroth, and Sanger includes the National Security Agency (NSA) as a victim within this network, completely deprived of any and all sense of morale, with the Shadow Brokers being the villains responsible for the crime. This framing is obvious when referring to the case as “one of the biggest security debacles ever to afflict American intelligence” and as exceeding by a significant margin the damage that was caused by Edward Snowden. They investigate how members of the NSA’s internal hacking division, known as Tailored Access Operations (T.A.O), have been impacted by the revelations, with some individuals leaving the organization and others being forced to cancel visits abroad out of concern for their safety. The reporting then continues to describe a toxic environment that is now plagued with polygraphs and suspensions, and the company has difficulties maintaining personnel (Makrakis et al., 2021). The journalists also cover additional victims of the actions taken by the Shadow Broker that led to the disruption of business across the globe. These victims include the millions of computers that were locked by ransomware, businesses that experienced the loss of all of their data, and hospitals in Indonesia, Britain, and even Pennsylvania that were forced to reject patients (Shane et al., 2017).

4. Requirements and specification
4.1. User Groups
Table 1 lists the Users or groups of Users who will be interested in using the system

 

Table 1 User Groups

 

User Name Role

Executive management Sponsor technological solutions to cyber-attacks

IT manager Plan and conduct assessment about systems vulnerability

Employees Apply the organization systems in service delivery

Clients Use the systems to access their needed services and products

4.2. Functional Requirements
Functional requirements describe a particular behavior of function of the system when certain conditions are met. The solutions functional requirements are;

i. Adherence to administrative rules – users will need administrator password to install any program to the system. The adherence would be critical in handling the systems and be capable of avoiding preventable security breaches that are contributed by ignorance and non-adherence that would create to losses to more stakeholders. The administrative rules that include considering a framework of guidance of how strong passwords are developed is critical in assuring the other users and stakeholders that a good initiative is in place in achieving success.

ii. Authentication – access to any system will require two-factor authentication (2FA). Authentication is critical to a system security and in this case SFA reduces the chances of a breach since the cyber-attacker would have two security framework that they have to venture and penetrate and the moment they are done with one results to an upgrade of the system and passwords pushing them to the drawing board. The functional approach increase security of the systems and makes the users confident in handling and protecting their data.

iii. Authorization level – an authorization hierarchy will be established to guide on rights and privileges for system users. In an organization, there are the individuals in different positions that are authorized to access confidential information in the system. The restriction to a given individuals to access the system is best in increasing accountability and also minimize risks of data breach. There is also the procedure followed when an employee is leaving the organization to make sure that the authorized is changed to prevent them from manipulating the system or exposure of data to competitors of the firm after leaving.

iv. Legal and regulatory requirements – all programs used will need to be authentic. No cracked programs to be installed in the system. In system development, there are individuals that developed the cracked version of the system for their own benefits and the best way to control the function is to prevent cracked versions through legal means. The persons found with the cracked version should be charged and this is only achieved when the organization goes the authentic way.

v. Audit tracking – the system will be able to keep audit trail for all users. There is the need for an audit tracking that ensure that all users are under control and management to avoid those that might contribute to breaches through poor practices that can be prevented.

4.3. Non-Functional Requirements (NFRs)
The non-functional requirements define the quality and performance attributes of the solution

 

Table 2 Non Functional Requirements

 

NFR Type

 

Requirements

 

Implications on Design

and/or operation

 

Security

 

· The solution will be having the high ability to prevent security breaches.

· Successful control security breaches is an assurance that organization would operate during the business hours and outside the business hours without any disruptions.

· The users will be assured about the security of their data in the organization that makes it viable to seek services from the organization.

· A system that is secured protects the data of the clients that builds reputation and trust to work together.

· The data access in the system after getting the solution will be on need to know basis.

· The individuals that will be accessing the system will be known and authorized to do so.

· The approach ensure that unauthorized persons are prevented from causing a breach.

· The solution brings about ease among the staff that are using the system.

· Usability is about how effective the users can learn to use the system.

· The solution provides the easy use to the system including following administrative strategies.

· There is up to 97% reliability of the solution to the ‘ExternalBlue’ vulnerability. The term “reliability” refers to both the probability and the percentage that the program will continue to function correctly for a predetermined number of times or for a set period of time.

· The system would be operational 24/7 where it serves its functions attaining 97% of effectiveness. .

· The system would be relied upon by the users within the business hours and beyond.

 

· There would be an increase in the clients that seeks services from the organization due to positive reputation.

· Limited security issues when the solution is effective eliminate fines and charges associated with breach of client data.

· Integrity is achieved when authorized persons access the system only.

· The integrity of the data is about maintaining and assuring the consistency and accuracy through all the lifecycle.

· The integrity is achieved through good mechanisms that the system solution offers by minimizing on breaches.

· A successful usability is experienced through satisfaction of clients/customers.

· Efficiency in security protection.

· The reliability dictates that the solution to ‘ExternalBlue’ is the right intervention towards having a functional system that performs its functions as expected.

 

 

Data Integrity

 

Usability

 

Reliability

5. System Design
The creation of a technological solution that complies with the system’s functional requirements is the goal of the System Design phase of the software development life cycle. At this stage in the lifecycle of the project, there ought to be a Functional Specification that is primarily written in business terminology. This document ought to contain a comprehensive description of the operational requirements of the various organizational entities that will use the new system (Eian et al., 2020). The difficult task at hand is to convert all of this information into Technical Specifications that not only precisely define the layout of the system but also have the potential to be used as input during System Construction.

5.1. Solution Concept
Within the context of the system development lifecycle, the graphic that follows provides an illustration of all of the processes and deliverables associated with this phase. As part of the System Requirements Analysis process, a Functional Specification is developed, which is then converted into a physical architecture (Eian et al., 2020). The components of the system are dispersed over the physical architecture, useable interfaces are established and prototyped, and technical specifications are drafted for the application developers. This enables the application developers to construct and test the system.

 

5.2. Proposed System Architecture
A system’s architecture is a description of its primary components, the relationships (structures) between those components, and the ways in which those components interact with one another. The architecture of a system can be thought of as its blueprint (Makrakis et al., 2021). It establishes a communication and coordination mechanism among the components of the system while also providing an abstraction for managing the complexity of the system. It defines a structured solution that may meet all of the technological and operational needs while simultaneously optimizing the common quality aspects, such as performance and security.

5.2.1 Alternative 1
The alternative 1 that the team chosen was an architecture that focuses on bringing about effectiveness and efficiency in the workplace and has a 50% effectiveness in terms of addressing the security issue. The alternative was worth until when the second alternative was drafted based on the blueprint.
5.2.2 Alternative 2
The alternative is more promising to be adopted in the organization because it addresses the issues that is experienced in the system especially the ExternalBlue through the provision of an abstraction in the management of system complexity and coordination mechanism among components.
5.2.3 Reason of Choosing the Alternative
My team chosen the second alternative because they consider that it carries simplicity and also secure. Architecture serves as a blueprint for a system. It provides an abstraction to manage the system complexity and establish a communication and coordination mechanism among components. It defines a structured solution to meet all the technical and operational requirements, while optimizing the common quality attributes like performance and security.

5.2.4 Production and Staging Environments
A testing environment that is referred to as a stage, staging, or pre-production environment is one that is designed to seem exactly like a production environment. It attempts to simulate a real-world production setting as accurately as possible and may establish connections to various production-related services, data, and resources, such as databases. There is a requirement for staging in order to determine whether or not the system is effective in terms of both its security and its functionality by means of conducting tests.

5.3. Component Design

Component

 

Off shelf/Custom

 

Justification/Alternative

 

Processor – 2.8-3.0 GHz

 

Off the Shelf

 

Ryzen 5, 7

 

RAM – 4 GB per core

 

Off the Shelf

 

n/a

 

Standard Hard drive

 

Off the Shelf

 

256 GB Solid State Drive

 

Oracle Enterprise Linux 4

 

Custom

 

To be able to autonomously work with the specified hardware requirements

 

Oracle Enterprise Linux 7

 

Off the Shelf

 

 

Oracle Solaris 10 (x86)

 

Custom

 

To be able to autonomously work with the specified hardware requirements

5.3

5.3.1 Hardware Components
a. 4 Cores, 2.8-3.0 GHz each (2.8 GHz minimum speed)

b. 4 GB RAM per core

c. Standard hard drive, 100 GB free

d. Network connectivity

1.

2.

3.

4.

4.1.

4.2.

4.3.

4.3.1.

5.3.2 Software Components
a) Oracle Enterprise Linux 4 Update 7 or greater, 64-bit

b) Oracle Enterprise Linux 5 Update 3 or greater, 64-bit

c) Oracle Enterprise Linux 6 64-bit

d) Oracle Solaris 10 (x86)

e) Red Hat Enterprise Linux 4.0 Update 7 or greater, 64-bit

f) Red Hat Enterprise Linux 5.0 Update 3 or greater, 64-bit

5.3.2.1 User Interface – Web client
– Based on the system requirements listed in the previous sections, we present the system use case diagram as shown in Figure x

5.3.2.2. Use Case Description
For each of the identified use cases, we provide, in Table 3, a more detailed description. Use case description shows how users will interact with the solution. It describes, from a user’s point of view, the solution’s behavior as it responds to user requests.

 

5.3.2.3. Back-End Database
The system will use the back-end database file system that ensure that the users experience a better usability when accessing data that they have already keyed. The back-end database is offering the possibility of accessing stored data especially for products ordered online guiding on delivery (Makrakis et al., 2021).

4.4.Design Evaluation
Table 4 shows a comparison between the On-Cloud Option and the On-Site Option

Where do you want to host your system << on-cloud vs on-site and why>>

Table 4

 

6. Implementation
In order to facilitate the understanding of the system that contains several major components, we start with high level architecture. The source code for this project is provided in Appendix C.

6.1 System Implemented Architecture
Figure 7 shows the major components of the system.

Figure 7 High Level Implementation Architecture

2

3

4

5

6

6.1

6.1.1

6.2 Access Levels
When it comes to determining whether or not a user is allowed to interact with a software, public and private are two of the most prevalent access levels. In a third instance, a guarded, all members of the appropriate class are granted access. The solution ensure that only authorized system users are allowed to access the system and minimize breach.

6.2

6.3

6.1.

6.3 System Services or Functionalities
The system services/functionality include allowing data to be collected and stored in the electronic format that facilitate an easy access by the users. The system is needed to bring effectiveness and efficiency to the users through its functionality in processing data and creates a centralized platform. The system is designed that it carries best components and structure that helps in countering cybersecurity challenges and make it effective .

 

Testing, Analysis and Evaluation
7.1 Testing Methodology
The verification procedure concludes with system testing. These tests are used to see if all of the integrated components are working to their full potential. When it comes to evaluating whether a system can meet quality standards and adhere to all essential requirements, the testing procedure is critical. To ensure objectivity, testers who were not involved in the application’s development are used to test this technique. This operation is also carried out in an atmosphere that is quite similar to that of the manufacturing phase. A critical part of the development process is system testing, which ensures that the application is meeting all of its functional, technical, and commercial goals. System testing is critical because it ensures that the application meets the customer’s technical, functional, and business requirements. There are steps that are followed and this include the requirement analysis, software testing planning, environmental setup, test case development environmental setup and finally the execution test step. The test results are recorded based on the target system function, feature/functions and how they are working, and finally the functionality. The information is then recorded and documented and all this are done following the test schedule and later exit criteria is adopted last.

7.2 System Analysis and Evaluation
System analysis and evaluation is critical in the process of making any system and this is contributed by the fact that expectation of every system is to make sure that it serves its purpose.

7.3 Test Execution and Test Results
It is necessary to execute tests in order to see if the expected and actual outcomes match up. During the course of a test, the following considerations should be kept in mind: Select a subset of the test suite for this cycle based on a risk. For each testing process, assign a set of test cases to be executed by a tester. The results was impressive that it met the expectations of system development and capable to counter the ExternalBlue vulnerability.

7.3.1 Functional Testing
For each feature of the system, we have checked to see if the delivered solution already meets the requirements of that feature. Manual exploratory testing was performed for functional testing, in which we ran and evaluated each required scenario. Based on the functions it was designed to accomplish, the system was found to be functionally sound.
7.4 Examples on testing
7.4.1 Check password Strength
The password strength was tested and this is where the results showed a positive outcome of the system development where 8 digit password was needed and effective combining numbers, letters, capital and small letters. The testing example showed efficacy in meeting the expected desire.
7. Issues, Engineering Tools and Standards
7.1. Issues
The several issues that we faced in the process include:

Delays in the project implementation.

System failure to meet desired standards per sections developed

Inadequacy of the resources needed

7.2. Engineering Tools and Standards
The standards that I considered in the process of system development include the usability, security, interoperability, accuracy and standards. The tools that were critical include the compilers and code editor.

8. Teamwork
Teamwork has contributed much to the current success of the project and this was possible where we would share ideas and concepts that brings about solutions to the problem.

Appendix B

Table 7 shows the responsiblites, Contributions, and expertise of each of the team members.

Table 7 Team responsiblites, Contributions, and expertise

 

Student

 

Responsiblities

 

Contribution

 

Expertise

 

Student 1

 

Evaluation

Authorization

Design

Implementing database

 

Business concepts

Technical lead

Design lead

Develops databases

 

– Business analyst

 

Student 2

 

– Architect

 

Student 3

 

– System Design

 

Student 4

 

– Developer

 

9. Conclusion
In this section, we list the conclusion and future work respectively.

9.1. Conclusion
Handling the ExternalBlue vulnerability in a system is a challenge that is addressed once the problem is well identified analyzed and addressed in a more extensive way to avoid losses that it brings to an organization. Vulnerabilities has become a threat to most organization where there are annual reports about cyber-attacks that affect the resources of organization and one of the common vulnerability reported is ExternalBlue. In this paper, more focus has been directed towards developing a system that addresses the vulnerability in the system used in the organization making sure that it has security features that counter the vulnerability for prevention purposes.

9.2. Future Work
There is the need for more research in future that would target other vulnerability apart from the ExternalBlue to consider addressing the cybersecurity challenges that are there (Eian et al., 2020). There are other major vulnerabilities that needs an intervention and researchers need to focus on them.

 

 

Appendix A: Test Plan

Solution Name

 

Team Leader:

 

Student 1

 

Student 2

 

Student 3

 

Test
No. ID

 

Related Feature

 

Pre-conditions

 

Test Description (steps)

 

Expected Outcome

 

Test Outcome

 

1

 

security

 

Not Applicable

 

1. Try with a hacker penetrating the password identification system.

 

System Database will record the attempted attack

 

Test evaluation on effectiveness and allow improvement

 

Appendix B: Progress Report-Teamwork

ID Task Name / Owner Timespan – Week # Status Mitigation Action

Description 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Risk Likelihood Impact Severity

of the Risk if the based on Occurring Risk Impact

occurs and likelihood

 

1.0

 

Project Plan

 

Team

 

X

 

X

 

X

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Completed

 

 

5.1

 

ER Diagram

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Project ERD is incomplete

 

Low

 

High

 

Low

 

Completed

 

The team do the review

 

5.2

 

Use Case Diagram

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Use cases do not reflect

actual requirements

 

Low

 

Moderate

 

moderate

 

Completed

 

Stakeholders representative review

 

 

8.3

 

Final Report

 

Team

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

X

 

Do not complete the report on time

 

Low

 

High

 

High

 

Completed

 

Team will reflect changes to the Final Report as we go. By the deadline Team should have the major parts of the final report already

in place

 

References
Blanchard, B. & Fabrycky, W. (2010). Systems Engineering and Analysis (5th Ed.), New Jersey: Prentice Hall.

Ding, A., De Jesus, G., & Janssen, M. (2019). Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure. Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing – ICTRS ’19

Eian, I.,Yong., Li, M, Hasmaddi, N & tuz-Zahra, F. (2020). Integration of Security Modules in Software Development Lifecycle Phases.

Makrakis, Georgios Michail & Kolias, Constantinos & Kambourakis, Georgios & Rieger, Craig & Benjamin, Jacob. (2021). Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures.

Warren, Tom (April 15, 2017). Microsoft has already patched the NSA’s leaked Windows hacks. The Verge.

Greenberg, A. (2017, December 19). Hold North Korea accountable for WannaCry—And the NSA, too. Wired. Retrieved March 1, 2020, from https://www.wired.com/story/koreaaccountable-wannacry-nsa-eternal-blue/.

Greenberg, A. (2018, August 22). The untold story of NotPetya, the most devastating cyberattack in history. Wired. Retrieved March 1, 2020, from https://www.wired.com/story/notpetyacyberattack-ukraine-russia-code-crashed-the-world/.

Shane, S., Perlroth, N., & Sanger, D. E. (2017, November 12). Security breach and spilled secrets have shaken the N.S.A. to its core. The New York Times. Retrieved March 1, 2020, from https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html.

 


"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Ace Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Ace Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Ace Papers is known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Ace Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.