Instructions
Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work.
Note: make sure it aligns with Rubric
Open Source Intelligence Tech Research Project
Objective
The purpose of this Open Source Intelligence (OSINT) Project is to use publicly available sources of information to investigate an emerging application of technology and then prepare a report suitable for dissemination to interested parties in business and government (subscribers to a threat intelligence reporting service).
Overview
Your task is to develop an OSINT report which provides information about the characteristics of an emerging application of technology and the threats / attacks to which it may be vulnerable. The consumers of this report have an interest in developing suitable countermeasures to prevent attacks by a broad spectrum of attackers from hobbyists to quasi-professionals and criminal entities to well organized, nation-state sponsored groups. When possible, your OSINT should explore the types and identities of known attackers who are likely to target users and usages of the technology covered by your report.
The basic question that must be answered in your OSINT report is:
what are the cybersecurity implications (good or bad) of a specific emerging application of technology?
For this assignment, your role is that of a threat intelligence research intern working for a threat intelligence provider (private company). Your audience for this report will be subscribers to a cybersecurity threat intelligence reporting service provided by your employer. These subscribers are primarily senior managers and executives in businesses and government organizations.
The high-level visibility for your deliverable means that, in addition to easily accessed web sources and social media, your research must also include research-based journal articles, papers published in conference proceedings, and doctoral dissertations. Threat research and intelligence reports published by mainstream companies, e.g. Verizon, Forrester, Deloitte, etc., should also be considered for use as primary sources for your OSINT report. See step #3 under
Conduct Your OSINT Research (below) for additional information about how many sources are required and what types of sources are allowed.
The following information needs, previously identified by your company’s threat researchers, must be met by the deliverable for this assignment.
(a) Identification and description (characteristics) of the technology,
Potential or known uses of the technology to support or improve business operations of companies and government agencies; this includes development of products which incorporate
(b) the technology and potential or known uses of the technology to support or improve cybersecurity, i.e.
a. uses of the technology to reduce or manage risk
b. uses of the technology to increase resistance to threats/attacks
c. uses of the technology to decrease vulnerabilities in an existing technology application
(c) potential or known uses or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.
Instructions
Format your deliverable as a research report. Your report should include the following sections:
1. Title page with author and date
2. Table of Contents (also Table of Figures if graphics are used)
3. Executive Summary
4. Introduction
5. Technology Description and Usage Analysis
6. Threat Analysis
7. Summary and Conclusions
8. Reference List
Choose an Emerging Application of Technology
To begin, choose an emerging application of technology. Applications of technology that are currently in the
emerging stages include:
· 5G/6G Telecommunications Technologies & Implementations (Networks)
· Artificial Intelligence
· Autonomous Vehicles (ground, sea, or air)
· Blockchain Technology
· Data Science
· Deep Space Communication Networks
· Graphene
· Implantable Medical Devices (including brain, prosthetics, medication delivery, cardiac support, etc.)
· Infrastructure for Smart Cities (surveillance, monitoring, traffic control, utilities, etc.)
· Internet of Things (especially Operational Technology)
· Internet of Things Devices in Smart Homes / Smart Buildings
· Machine Learning
· Nano machines
· Neuromorphic computer chips
· Physical Unclonable Functions (PUFs) (devices & electrical circuits)
· Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots)
· Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.)
· Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services Sector
You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above) or included in the course readings, you must first request and receive your instructor’s permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.
Conduct Your OSINT Research & Information Acquisition
Step 1. Review this UMGC library guide to help you evaluate sources for your OSINT Research:
https://libguides.umgc.edu/credibility
Step 2. Brainstorm keywords that you can use to help find Internet sources of information about your chosen technology. You can also search for and review articles and postings in well known cybersecurity industry blogs, news articles, and social media accounts. See
https://agio.com/newsroom/the-top-10-cybersecurity-blogs-for-2021/
and
https://libguides.umgc.edu/cybersecurity
for lists of resources. You must find and use at least five different sources in this category (Internet sources).
Step 3. Use your initial set of sources to develop additional keyword lists to use in searching the UMGC library databases for professional journal articles, papers, and other scholarly publications (“sources’) which discuss your chosen emerging application of technology. You must find and report on five (5) or more Open Sources which you obtained from Internet web pages, social media, etc. You must also find and report on an additional five or more Open Sources which you obtained from databases which index professional and academic papers (see
https://libguides.umgc.edu/scholarly
if you are not sure what this means). The following UMGC library and/or freely available Internet databases are known to have suitable professional and/or research-based articles which meet the “databases” as source requirement:
· ACM Digital Library
https://dl-acm-org.ezproxy.umgc.edu/
· Dissertations & Theses (Pro Quest)
https://www-proquest-com.ezproxy.umgc.edu/pqdtglobal/advanced?accountid=14580
· IEEE Computer Society Digital Library
https://www-computer-org.ezproxy.umgc.edu/csdl/home
· Research Gate
https://www.researchgate.net/
(required free account to access papers)
· ARVIX
https://arxiv.org/
· Science Direct
https://www-sciencedirect-com.ezproxy.umgc.edu/search
Since the point of this OSINT search is to find information about
emerging applications of technology, your sources must have a publication date of 2018 or later (2018, 2019, 2020, 2021, 2022, 2023). For papers indexed in Science Direct, you may also use papers that are marked “In Press.”
When you have finished your research for this assignment
, you should have 15 or more well chosen, high quality, authoritative resources which you will use to meet the content requirements of this project. At least 5 of those resources must be from the professional literature, i.e. peer-reviewed journal articles, government or corporate documents or reports, trade publications, etc. See
https://libguides.umgc.edu/credibility and
https://libguides.umgc.edu/scholarly for additional information about evaluating sources.
5. Decide if you need to add images or not (including pictures, charts, graphics, etc.). If you do include images, you must make sure that each such item has a caption and that the caption includes the in-text citation for the source of the image (add the source to your list of references). The image must be readable (in focus, not blurry) and of an appropriate size. Any image or picture used MUST significantly add to the content and help the reader to understand your analysis. Do not add gratuitous imagery (no “eye candy” or decorative images). Do not add images just to increase your page count!
Note: if you have captioned items, you must include a Table of Figures after your Table of Contents.
Putting It All Together
1. Consult the grading rubric for specific content and formatting requirements for this assignment.
2. Your 8 to 12 page OSINT report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Title page, table of contents, and reference list do not count against the page count. Remember that your audience will benefit more from a clear, concise, and accurate presentation of information. Adding extra content just to artificially meet a page count (or exceeding the recommended length by adding filler) will not improve your grade.
3. Your paper should use standard terms and definitions for cybersecurity.
The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use. CSIA_Paper_Template(TOC+TOF,2021) x. This file has the
1. style gallery set up so that you can use the built-in features of MS Word to generate a Table of Contents and, if needed, a Table of Figures.
2. Your submitted file must include a separate cover page at the beginning which provides the assignment title, your name, and the due date. Your reference list must begin with a new (separate) page at the end of your file.
3. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
4. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
5. See the “Examples” section (below) for information about how to create a Table of Contents and Table of Figures. The built-in help for MS Word will also walk you through creating these content elements for your OSINT report.
Examples
Table of Contents
Objective 1
Overview 1
Instructions 2
Choose an Emerging Application of Technology 2
Conduct Your OSINT Research & Information Acquisition 3
Putting It All Together 4
Examples 5
References 7
The Table of Contents (TOC) above was generated using MS Word’s References > Table of Contents feature (see Figure 1). You must use the headings styles from the Style Gallery in order to have the TOC generated for you.
The Table of Figures (References > Insert Table of Figures) requires that you use the Style Gallery’s “caption” style. An example of the Style Gallery window is shown in Figure 2.
When using Heading or Caption Styles in the Style Gallery, you can (should) change them to Black Font, 11 or 12 point, and add space before and after. Use the help feature in MS Word if you do not already know how to make these changes.
Figure 1. Reference Tab in MS Word (Microsoft, 2021)
Figure 2. Style Gallery in MS Word (Microsoft, 2021).
References
Microsoft. (2021). Microsoft Word (Office 365). Redmond, WA: Author.
image1
image2
skip to main content
Menu
My Home
UMGC Website – https://www.umgc.edu
CSIA 459 7382 Evaluating Emerging Technologies (2252)
Select a course…
Close
Message alerts
Close
Subscription alerts – You have new alerts
Subscription alerts
Close
Update alerts
Close
Jeannese Armahavatar
Close
-
Profile
- Notifications
- Account Settings
- Progress
- English (United States)
- Log Out
Course Home
Syllabus
Content
Activities and Assessments
Close
Assignments
Discussions
Quizzes
Self Assessments
Grades
My Tools
Close
Calendar
Class Progress
Classlist
Groups
Locker
Surveys
Academic Support
Close
MyUMGC
Academic Integrity
Accessibility Accommodations
Career Services
Effective Writing Center
Library
Turnitin
Tutoring
Help
Close
Classroom Navigation
Help Center
System Check
Technology Resources
More
Close
Course Home
Syllabus
Content
Activities and Assessments
Activities and Assessments
Assignments
Discussions
Quizzes
Self Assessments
Grades
My Tools
My Tools
Calendar
Class Progress
Classlist
Groups
Locker
Surveys
Academic Support
Academic Support
MyUMGC
Academic Integrity
Accessibility Accommodations
Career Services
Effective Writing Center
Library
Turnitin
Tutoring
Help
Help
Classroom Navigation
Help Center
System Check
Technology Resources
Menu Start
Menu Start
My Home
UMGC Website – https://www.umgc.edu
CSIA 459 7382 Evaluating Emerging Technologies (2252)
Select a course…
CSIA 459 7382 Evaluating Emerging Technologies (2252)
CSIA 459 7382 Evaluating Emerging Technologies (2252)
CSIA 459 7382 Evaluating Emerging Technologies (2252)
Course Home
Syllabus
Content
Activities and Assessments
Activities and Assessments
Assignments
Discussions
Quizzes
Self Assessments
Grades
My Tools
My Tools
Calendar
Class Progress
Classlist
Groups
Locker
Surveys
Academic Support
Academic Support
MyUMGC
Academic Integrity
Accessibility Accommodations
Career Services
Effective Writing Center
Library
Turnitin
Tutoring
Help
Help
Classroom Navigation
Help Center
System Check
Technology Resources
Menu End
Are You Still There?
Your session expires after 180 minutes of inactivity, which protects your information in case you’ve left your device without logging out.
Hit a key or click anywhere to stay logged in.
Oh, There You Are!
Assignments
Project 1: OSINT Tech Research Project
Project 1: OSINT Tech Research Project
Hide Assignment Information |
|
Turnitin™ | |
This assignment will be submitted to Turnitin™. |
|
Instructions | |
Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work. |
|
Due on Apr 15, 2025 11:59 PM | |
Attachments | |
CSIA 459 OSINT Tech Research Project 2023 x Download All Files |
Hide Rubrics
Rubric Name: OSINT Tech Research Project
OSINT Tech Research Project
Course: CSIA 459 7382 Evaluating Emerging Technologies (2252)
Criteria
Excellent
Outstanding
Acceptable
Needs Improvement
Needs Significant Improvement
Missing or Unacceptable
Criterion Score
Executive Summary
14 points
Provided an excellent executive summary which clearly, concisely, and accurately summarized the deliverable. Information from authoritative sources was used and cited.
12.6 points
Provided an outstanding executive summary which comprehensively summarized the deliverable. Information from authoritative sources was used and cited.
9.8 points
Provided an acceptable executive summary which summarized the deliverable but could be improved through additional editing or content. Information from authoritative sources was used and cited.
8.4 points
Provided an executive summary but, this section was lacking in detail. Information from authoritative sources was used and cited.
5.6 points
Attempted to provide an executive summary but, this section was significantly lacking in content OR the executive summary was not well supported by information from authoritative sources.
0 points
Executive summary was missing or not relevant to this deliverable.
Score of Executive Summary,
/ 14
*
Introduction or Overview of the Technology
14 points
Provided an excellent overview of an emerging technology or emerging application of technology. The overview included appropriately paraphrased and cited information from 5 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).
12.6 points
Provided an outstanding overview of an emerging technology or emerging application of technology. The overview included appropriately paraphrased and cited information from 3 or more authoritative sources including 1 or more professional articles or reports (see assignment for examples).
9.8 points
Provided an overview of an emerging technology or emerging application of technology. The overview provided some details about how the technology is used. The overview included paraphrased and appropriately cited information from authoritative sources.
8.4 points
Identified an appropriate technology. Provided an overview or introduction but, this section was lacking in detail. Information from authoritative sources was used and cited in the overview.
5.6 points
Identified an appropriate technology but the overview of that technology was significantly lacking in detail, was very disorganized, and/or was not well supported by information from authoritative sources.
0 points
The introduction and/or overview section of the paper was off topic or failed to provide an overview of the emerging application of technology.
Score of Introduction or Overview of the Technology,
/ 14
*
Technology Description and Usage Analysis
21 points
Provided an excellent discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. The discussion was clear, concise, and accurate. Appropriately used information from 10 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).
18.27 points
Provided an outstanding discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. The discussion was clear and accurate. Appropriately used information from 8 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).
15.33 points
Provided an acceptable discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. Appropriately used information from 5 or more authoritative sources including 2 or more professional articles or reports (see assignment for examples).
11.13 points
Provided an acceptable discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. Appropriately used information from 5 or more authoritative sources including 2 or more professional articles or reports (see assignment for examples).
5.67 points
Discussed cybersecurity benefits from the use of the emerging technology but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources.
0 points
The discussion of cybersecurity improvements / support from use of the emerging technology was missing or was not relevant to the selected technology.
Score of Technology Description and Usage Analysis,
/ 21
*
Threat Analysis for the Technology
21 points
Provided an excellent discussion of how the emerging technology or emerging application of technology could be attacked or threatened. Discussion provided five or more examples of relevant threats, attacks or vulnerabilities for the technology or products which use it. The discussion was clear, concise, and accurate. Appropriately used information from 8 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).
18.27 points
Provided an outstanding discussion of how the emerging technology or emerging application of technology could be attacked or threatened. Discussion provided three or more examples of relevant threats, attacks or vulnerabilities for the technology or products which use it. The discussion was clear and accurate. Appropriately used information from 5 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).
15.33 points
Provided an acceptable discussion of how the emerging technology or emerging application of technology could be attacked or threatened. Discussion provided two or more examples of relevant threats, attacks or vulnerabilities for the technology or products which use it. Appropriately used information from 3 or more authoritative sources including at least one professional article or report (see assignment for examples).
11.13 points
Discussion provided some information and examples of threats, attacks, and vulnerabilities affecting the technology or products using the technology. Appropriately used information from 2 or more authoritative sources.
5.67 points
Discussed attacks and/or reported on how the technology could be threatened but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources.
0 points
This section was missing or the content was not relevant to the assignment.
Score of Threat Analysis for the Technology,
/ 21
*
Exploitation Analysis for the Technology
21 points
Provided an excellent discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited (3 or more specific examples). The discussion was clear, concise, and accurate. Appropriately paraphrased and cited information from 10 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).
18.27 points
Provided an outstanding discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited (2 or more specific examples). The discussion was clear and accurate. Appropriately paraphrased and cited information from 8 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).
15.33 points
Provided an outstanding discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited (including at least one specific example). Appropriately paraphrased and cited information from 5 or more authoritative sources including 2 or more professional articles or reports (see assignment for examples).
11.13 points
Discussion provided few details in regards to how the emerging technology or emerging application of technology could be used or exploited by attackers. Provided few details regarding known or suspected (anticipated) vulnerabilities in the technology. Information from authoritative sources was used in the discussion.
5.67 points
Discussed attacks and/or reported on how the technology could be used against defenders but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources.
0 points
This section was missing or the content was not relevant to the assignment.
Score of Exploitation Analysis for the Technology,
/ 21
*
Summary and Conclusions
14 points
Provided a clear, concise, and accurate summary of the threat analysis which included 3 more more relevant conclusions about the vulnerability of the technology. Information from authoritative sources was used and cited.
11.2 points
Provided a clear, concise, and accurate summary of the threat analysis which included at least 2 relevant conclusions about the vulnerability of the technology. Information from authoritative sources was used and cited.
9.8 points
Provided an acceptable closing paragraph which summarized the threat analysis and included at least one relevant conclusion. Information from authoritative sources was used and cited.
8.4 points
Provided a closing paragraph but the summary did not adequately address the content of the deliverable. Information from authoritative sources was used.
5.6 points
Attempted to provide a summary but this section was significantly lacking in content OR was not well supported by information drawn from authoritative sources.
0 points
Section was missing or content was not relevant to the topic of this deliverable.
Score of Summary and Conclusions,
/ 14
*
Quality of Research, Citations, and References
14 points
Work was well researched and contains information paraphrased from at least 15 authoritative sources. Paraphrasing, citing, and reference list entries use a consistent format and include sufficient source identification information to allow the reader to fact-check the information presented in this deliverable.
12.6 points
Work was well researched and contains information paraphrased from 12 or more authoritative sources. Paraphrasing, citing, and reference list entries use a consistent format and include sufficient source identification information to allow the reader to fact-check the information presented in this deliverable.
11.2 points
Work was well researched and contains information paraphrased from 8 or more authoritative sources. Paraphrasing, citing, and reference list entries use a consistent format (minor inconsistencies allowed) and provides sufficient source information to allow the reader to fact-check the information presented in this deliverable.
8.4 points
Work shows some evidence of research and contains information paraphrased from at least 3 authoritative sources. Inconsistencies in formatting and/or missing citation and publication information make it difficult to fact check some sources.
5.6 points
Work has minimal research and/or fundamentally fails to appropriately use and cite information from authoritative sources. OR the work was not well supported by information from authoritative sources.
0 points
Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.
Score of Quality of Research, Citations, and References,
/ 14
*
Organization & Appearance
7 points
Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.
5.6 points
Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).
4.2 points
Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.
2.8 points
Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.
1.4 points
Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.
0 points
No work submitted.
Score of Organization & Appearance,
/ 7
*
Execution
14 points
No formatting, grammar, spelling, or punctuation errors.
11.2 points
Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.
9.8 points
Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.
8.4 points
Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.
5.6 points
Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.
0 points
No work submitted.
Score of Execution,
/ 14
*
Total
Score of OSINT Tech Research Project,
/ 140
*
Overall Score
Excellent
126 points minimum
Outstanding
112 points minimum
Acceptable
98 points minimum
Needs Improvement
78.4 points minimum
Needs Significant Improvement
50.4 points minimum
Missing or Unacceptable
0 points minimum
Unable to save changes. There may be a problem with your connection.
Submit Assignment
There was an error submitting your text or file to the folder. Please fill in the text submission or re-submit the files.
Files to submit
(0) file(s) to submit
After uploading, you must click Submit to complete the submission.
Add a FileRecord AudioRecord Video
Comments
Paragraph
Close
Paragraph
Heading 1
Heading 2
Heading 3
Heading 4
Blockquote
Code
Paragraph
Close
Paragraph
Heading 1
Heading 2
Heading 3
Heading 4
Blockquote
Code
Close
Underline
Strike-through
Superscript
Subscript
Close
Bold
Italic
Underline
Strike-through
Superscript
Subscript
Select Color
Close
Left
Center
Right
Justify
Left to Right
Right to Left
Close
Bulleted List
Numbered List
Increase Indent
Decrease Indent
Close
Graphical Equation
LaTeX Equation
MathML Equation
Chemistry Equation
Close
Insert Table
1 column by 1 row
More Options
Cell
Cell
Cell Properties
Merge Cells
Split Cell
Row
Row
Insert Row Before
Insert Row After
Delete Row
Row Properties
Cut Row
Copy Row
Paste Row Before
Paste Row After
Column
Column
Insert Column Before
Insert Column After
Delete Column
Cut Column
Copy Column
Paste Column Before
Paste Column After
Sort
Sort
Sort by Column Ascending
Sort by Column Descending
Advanced Sort
Table Properties
Delete Table
Close
Equation
Equation
Graphical Equation
LaTeX Equation
MathML Equation
Chemistry Equation
Table
Table
Insert Table
1 column by 1 row
More Options
Cell
Cell
Cell Properties
Merge Cells
Split Cell
Row
Row
Insert Row Before
Insert Row After
Delete Row
Row Properties
Cut Row
Copy Row
Paste Row Before
Paste Row After
Column
Column
Insert Column Before
Insert Column After
Delete Column
Cut Column
Copy Column
Paste Column Before
Paste Column After
Sort
Sort
Sort by Column Ascending
Sort by Column Descending
Advanced Sort
Table Properties
Delete Table
Insert Stuff
Insert Quicklink
Insert Image
Attributes
Divider
Emoji
Symbols
Insert Code
Lato (Recommended)
Close
Arabic Transparent
Arial
Comic Sans
Courier
Ezra SIL
Georgia
Lato (Recommended)
SBL Hebrew
Simplified Arabic
Tahoma
Times New Roman
Traditional Arabic
Trebuchet
Verdana
돋움 (Dotum)
宋体 (Sim Sun)
細明體 (Ming Liu)
19px (Default)
Close
10px
12px
14px
16px
19px (Default)
20px
24px
32px
48px
Close
Font
Font
Arabic Transparent
Arial
Comic Sans
Courier
Ezra SIL
Georgia
Lato (Recommended)
SBL Hebrew
Simplified Arabic
Tahoma
Times New Roman
Traditional Arabic
Trebuchet
Verdana
돋움 (Dotum)
宋体 (Sim Sun)
細明體 (Ming Liu)
Font Size
Font Size
10px
12px
14px
16px
19px (Default)
20px
24px
32px
48px
Close
Preview
Source Code
Accessibility Checker
Word Count