OSINT Project

Instructions

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work.

Note: make sure it aligns with Rubric

Open Source Intelligence Tech Research Project

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Objective

The purpose of this Open Source Intelligence (OSINT) Project is to use publicly available sources of information to investigate an emerging application of technology and then prepare a report suitable for dissemination to interested parties in business and government (subscribers to a threat intelligence reporting service).

Overview

Your task is to develop an OSINT report which provides information about the characteristics of an emerging application of technology and the threats / attacks to which it may be vulnerable. The consumers of this report have an interest in developing suitable countermeasures to prevent attacks by a broad spectrum of attackers from hobbyists to quasi-professionals and criminal entities to well organized, nation-state sponsored groups. When possible, your OSINT should explore the types and identities of known attackers who are likely to target users and usages of the technology covered by your report.

The basic question that must be answered in your OSINT report is:
what are the cybersecurity implications (good or bad) of a specific emerging application of technology?

For this assignment, your role is that of a threat intelligence research intern working for a threat intelligence provider (private company). Your audience for this report will be subscribers to a cybersecurity threat intelligence reporting service provided by your employer. These subscribers are primarily senior managers and executives in businesses and government organizations.

The high-level visibility for your deliverable means that, in addition to easily accessed web sources and social media, your research must also include research-based journal articles, papers published in conference proceedings, and doctoral dissertations. Threat research and intelligence reports published by mainstream companies, e.g. Verizon, Forrester, Deloitte, etc., should also be considered for use as primary sources for your OSINT report. See step #3 under
Conduct Your OSINT Research (below) for additional information about how many sources are required and what types of sources are allowed.

The following information needs, previously identified by your company’s threat researchers, must be met by the deliverable for this assignment.

(a) Identification and description (characteristics) of the technology,

Potential or known uses of the technology to support or improve business operations of companies and government agencies; this includes development of products which incorporate

(b) the technology and potential or known uses of the technology to support or improve cybersecurity, i.e.

a. uses of the technology to reduce or manage risk

b. uses of the technology to increase resistance to threats/attacks

c. uses of the technology to decrease vulnerabilities in an existing technology application

(c) potential or known uses or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.

Instructions

Format your deliverable as a research report. Your report should include the following sections:

1. Title page with author and date

2. Table of Contents (also Table of Figures if graphics are used)

3. Executive Summary

4. Introduction

5. Technology Description and Usage Analysis

6. Threat Analysis

7. Summary and Conclusions

8. Reference List

Choose an Emerging Application of Technology

To begin, choose an emerging application of technology. Applications of technology that are currently in the
emerging stages include:

· 5G/6G Telecommunications Technologies & Implementations (Networks)

· Artificial Intelligence

· Autonomous Vehicles (ground, sea, or air)

· Blockchain Technology

· Data Science

· Deep Space Communication Networks

· Graphene

· Implantable Medical Devices (including brain, prosthetics, medication delivery, cardiac support, etc.)

· Infrastructure for Smart Cities (surveillance, monitoring, traffic control, utilities, etc.)

· Internet of Things (especially Operational Technology)

· Internet of Things Devices in Smart Homes / Smart Buildings

· Machine Learning

· Nano machines

· Neuromorphic computer chips

· Physical Unclonable Functions (PUFs) (devices & electrical circuits)

· Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots)

· Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.)

· Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services Sector

You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.

If you decide to research a technology that is not on the suggested technologies list (see above) or included in the course readings, you must first request and receive your instructor’s permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.

Conduct Your OSINT Research & Information Acquisition

Step 1. Review this UMGC library guide to help you evaluate sources for your OSINT Research:

https://libguides.umgc.edu/credibility

Step 2. Brainstorm keywords that you can use to help find Internet sources of information about your chosen technology. You can also search for and review articles and postings in well known cybersecurity industry blogs, news articles, and social media accounts. See

https://agio.com/newsroom/the-top-10-cybersecurity-blogs-for-2021/

and

https://libguides.umgc.edu/cybersecurity

for lists of resources. You must find and use at least five different sources in this category (Internet sources).

Step 3. Use your initial set of sources to develop additional keyword lists to use in searching the UMGC library databases for professional journal articles, papers, and other scholarly publications (“sources’) which discuss your chosen emerging application of technology. You must find and report on five (5) or more Open Sources which you obtained from Internet web pages, social media, etc. You must also find and report on an additional five or more Open Sources which you obtained from databases which index professional and academic papers (see

https://libguides.umgc.edu/scholarly

if you are not sure what this means). The following UMGC library and/or freely available Internet databases are known to have suitable professional and/or research-based articles which meet the “databases” as source requirement:

· ACM Digital Library

https://dl-acm-org.ezproxy.umgc.edu/

· Dissertations & Theses (Pro Quest)

https://www-proquest-com.ezproxy.umgc.edu/pqdtglobal/advanced?accountid=14580

· IEEE Computer Society Digital Library

https://www-computer-org.ezproxy.umgc.edu/csdl/home

· Research Gate

https://www.researchgate.net/

(required free account to access papers)

· ARVIX

https://arxiv.org/

· Science Direct

https://www-sciencedirect-com.ezproxy.umgc.edu/search

Since the point of this OSINT search is to find information about
emerging applications of technology, your sources must have a publication date of 2018 or later (2018, 2019, 2020, 2021, 2022, 2023). For papers indexed in Science Direct, you may also use papers that are marked “In Press.”

When you have finished your research for this assignment
, you should have 15 or more well chosen, high quality, authoritative resources which you will use to meet the content requirements of this project. At least 5 of those resources must be from the professional literature, i.e. peer-reviewed journal articles, government or corporate documents or reports, trade publications, etc. See
https://libguides.umgc.edu/credibility and
https://libguides.umgc.edu/scholarly for additional information about evaluating sources.

5. Decide if you need to add images or not (including pictures, charts, graphics, etc.). If you do include images, you must make sure that each such item has a caption and that the caption includes the in-text citation for the source of the image (add the source to your list of references). The image must be readable (in focus, not blurry) and of an appropriate size. Any image or picture used MUST significantly add to the content and help the reader to understand your analysis. Do not add gratuitous imagery (no “eye candy” or decorative images). Do not add images just to increase your page count!

Note: if you have captioned items, you must include a Table of Figures after your Table of Contents.

Putting It All Together

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 8 to 12 page OSINT report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Title page, table of contents, and reference list do not count against the page count. Remember that your audience will benefit more from a clear, concise, and accurate presentation of information. Adding extra content just to artificially meet a page count (or exceeding the recommended length by adding filler) will not improve your grade.

3. Your paper should use standard terms and definitions for cybersecurity.

The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use. CSIA_Paper_Template(TOC+TOF,2021) x.  This file has the

1. style gallery set up so that you can use the built-in features of MS Word to generate a Table of Contents and, if needed, a Table of Figures.

2. Your submitted file must include a separate cover page at the beginning which provides the assignment title, your name, and the due date. Your reference list must begin with a new (separate) page at the end of your file.

3. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 

4. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

5. See the “Examples” section (below) for information about how to create a Table of Contents and Table of Figures. The built-in help for MS Word will also walk you through creating these content elements for your OSINT report.

Examples

Table of Contents
Objective 1
Overview 1
Instructions 2
Choose an Emerging Application of Technology 2
Conduct Your OSINT Research & Information Acquisition 3
Putting It All Together 4
Examples 5
References 7

The Table of Contents (TOC) above was generated using MS Word’s References > Table of Contents feature (see Figure 1). You must use the headings styles from the Style Gallery in order to have the TOC generated for you.

The Table of Figures (References > Insert Table of Figures) requires that you use the Style Gallery’s “caption” style. An example of the Style Gallery window is shown in Figure 2.

When using Heading or Caption Styles in the Style Gallery, you can (should) change them to Black Font, 11 or 12 point, and add space before and after. Use the help feature in MS Word if you do not already know how to make these changes.

Figure 1. Reference Tab in MS Word (Microsoft, 2021)

Figure 2. Style Gallery in MS Word (Microsoft, 2021).

References

Microsoft. (2021). Microsoft Word (Office 365). Redmond, WA: Author.

image1

image2

skip to main content

Menu

My Home

UMGC Website – https://www.umgc.edu

CSIA 459 7382 Evaluating Emerging Technologies (2252)

Select a course…

Close

Message alerts

Close

Subscription alerts – You have new alerts

Subscription alerts

Close

Update alerts

Close

Jeannese Armahavatar

Close

  • Profile

  • Notifications

  • Account Settings

  • Progress

  • English (United States)

  • Log Out

Course Home

Syllabus

Content

Activities and Assessments

Close

Assignments

Discussions

Quizzes

Self Assessments

Grades

My Tools

Close

Calendar

Class Progress

Classlist

Groups

Locker

Surveys

Academic Support

Close

MyUMGC

Academic Integrity

Accessibility Accommodations

Career Services

Effective Writing Center

Library

Turnitin

Tutoring

Help

Close

Classroom Navigation

Help Center

System Check

Technology Resources

More

Close

Course Home

Syllabus

Content

Activities and Assessments

Activities and Assessments

Assignments

Discussions

Quizzes

Self Assessments

Grades

My Tools

My Tools

Calendar

Class Progress

Classlist

Groups

Locker

Surveys

Academic Support

Academic Support

MyUMGC

Academic Integrity

Accessibility Accommodations

Career Services

Effective Writing Center

Library

Turnitin

Tutoring

Help

Help

Classroom Navigation

Help Center

System Check

Technology Resources

Menu Start

Menu Start

My Home

UMGC Website – https://www.umgc.edu

CSIA 459 7382 Evaluating Emerging Technologies (2252)

Select a course…

CSIA 459 7382 Evaluating Emerging Technologies (2252)
CSIA 459 7382 Evaluating Emerging Technologies (2252)

CSIA 459 7382 Evaluating Emerging Technologies (2252)

Course Home

Syllabus

Content

Activities and Assessments

Activities and Assessments

Assignments

Discussions

Quizzes

Self Assessments

Grades

My Tools

My Tools

Calendar

Class Progress

Classlist

Groups

Locker

Surveys

Academic Support

Academic Support

MyUMGC

Academic Integrity

Accessibility Accommodations

Career Services

Effective Writing Center

Library

Turnitin

Tutoring

Help

Help

Classroom Navigation

Help Center

System Check

Technology Resources

Menu End

Are You Still There?

Your session expires after 180 minutes of inactivity, which protects your information in case you’ve left your device without logging out.

Hit a key or click anywhere to stay logged in.

Oh, There You Are!

Assignments

Project 1: OSINT Tech Research Project

Project 1: OSINT Tech Research Project

Hide Assignment Information

Turnitin™

This assignment will be submitted to Turnitin™.

Instructions

Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work.

Due on Apr 15, 2025 11:59 PM
Attachments

CSIA 459 OSINT Tech Research Project 2023 x
(96.91 KB)

Download All Files

Hide Rubrics

Rubric Name: OSINT Tech Research Project

Print

Print

OSINT Tech Research Project

Course: CSIA 459 7382 Evaluating Emerging Technologies (2252)

Criteria

Excellent

Outstanding

Acceptable

Needs Improvement

Needs Significant Improvement

Missing or Unacceptable

Criterion Score

Executive Summary

14 points

Provided an excellent executive summary which clearly, concisely, and accurately summarized the deliverable. Information from authoritative sources was used and cited.

12.6 points

Provided an outstanding executive summary which comprehensively summarized the deliverable. Information from authoritative sources was used and cited.

9.8 points

Provided an acceptable executive summary which summarized the deliverable but could be improved through additional editing or content. Information from authoritative sources was used and cited.

8.4 points

Provided an executive summary but, this section was lacking in detail. Information from authoritative sources was used and cited.

5.6 points

Attempted to provide an executive summary but, this section was significantly lacking in content OR the executive summary was not well supported by information from authoritative sources.

0 points

Executive summary was missing or not relevant to this deliverable.

Score of Executive Summary,

/ 14
*

Introduction or Overview of the Technology

14 points

Provided an excellent overview of an emerging technology or emerging application of technology. The overview included appropriately paraphrased and cited information from 5 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).

12.6 points

Provided an outstanding overview of an emerging technology or emerging application of technology. The overview included appropriately paraphrased and cited information from 3 or more authoritative sources including 1 or more professional articles or reports (see assignment for examples).

9.8 points

Provided an overview of an emerging technology or emerging application of technology. The overview provided some details about how the technology is used. The overview included paraphrased and appropriately cited information from authoritative sources.

8.4 points

Identified an appropriate technology. Provided an overview or introduction but, this section was lacking in detail. Information from authoritative sources was used and cited in the overview.

5.6 points

Identified an appropriate technology but the overview of that technology was significantly lacking in detail, was very disorganized, and/or was not well supported by information from authoritative sources.

0 points

The introduction and/or overview section of the paper was off topic or failed to provide an overview of the emerging application of technology.

Score of Introduction or Overview of the Technology,

/ 14
*

Technology Description and Usage Analysis

21 points

Provided an excellent discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. The discussion was clear, concise, and accurate. Appropriately used information from 10 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).

18.27 points

Provided an outstanding discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. The discussion was clear and accurate.  Appropriately used information from 8 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).

15.33 points

Provided an acceptable discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. Appropriately used information from 5 or more authoritative sources including 2 or more professional articles or reports (see assignment for examples).

11.13 points

Provided an acceptable discussion of the characteristics and uses of an appropriate emerging technology or emerging application of technology. Appropriately used information from 5 or more authoritative sources including 2 or more professional articles or reports (see assignment for examples).

5.67 points

Discussed cybersecurity benefits from the use of the emerging technology but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

The discussion of cybersecurity improvements / support from use of the emerging technology was missing or was not relevant to the selected technology.

Score of Technology Description and Usage Analysis,

/ 21
*

Threat Analysis for the Technology

21 points

Provided an excellent discussion of how the emerging technology or emerging application of technology could be attacked or threatened. Discussion provided five or more examples of relevant threats, attacks or vulnerabilities for the technology or products which use it. The discussion was clear, concise, and accurate. Appropriately used information from 8 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).

18.27 points

Provided an outstanding discussion of how the emerging technology or emerging application of technology could be attacked or threatened. Discussion provided three or more examples of relevant threats, attacks or vulnerabilities for the technology or products which use it. The discussion was clear  and accurate. Appropriately used information from 5 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).

15.33 points

Provided an acceptable discussion of how the emerging technology or emerging application of technology could be attacked or threatened. Discussion provided two or more examples of relevant threats, attacks or vulnerabilities for the technology or products which use it. Appropriately used information from 3 or more authoritative sources including at least one professional article or report (see assignment for examples).

11.13 points

Discussion provided some information and examples of threats, attacks, and vulnerabilities affecting the technology or products using the technology. Appropriately used information from 2 or more authoritative sources.

5.67 points

Discussed attacks and/or reported on how the technology could be threatened but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing or the content was not relevant to the assignment.

Score of Threat Analysis for the Technology,

/ 21
*

Exploitation Analysis for the Technology

21 points

Provided an excellent discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited (3 or more specific examples). The discussion was clear, concise, and accurate. Appropriately paraphrased and cited information from 10 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).

18.27 points

Provided an outstanding discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited (2 or more specific examples). The discussion was clear and accurate. Appropriately paraphrased and cited information from 8 or more authoritative sources including 3 or more professional articles or reports (see assignment for examples).

15.33 points

Provided an outstanding discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited (including at least one specific example). Appropriately paraphrased and cited information from 5 or more authoritative sources including 2 or more professional articles or reports (see assignment for examples).

11.13 points

Discussion provided few details in regards to how the emerging technology or emerging application of technology could be used or exploited by attackers. Provided few details regarding known or suspected (anticipated) vulnerabilities in the technology. Information from authoritative sources was used in the discussion.

5.67 points

Discussed attacks and/or reported on how the technology could be used against defenders but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

0 points

This section was missing or the content was not relevant to the assignment.

Score of Exploitation Analysis for the Technology,

/ 21
*

Summary and Conclusions

14 points

Provided a clear, concise, and accurate summary of the threat analysis which included 3 more more relevant conclusions about the vulnerability of the technology. Information from authoritative sources was used and cited.

11.2 points

Provided a clear, concise, and accurate summary of the threat analysis which included at least 2 relevant conclusions about the vulnerability of the technology. Information from authoritative sources was used and cited.

9.8 points

Provided an acceptable closing paragraph which summarized the threat analysis and included at least one relevant conclusion. Information from authoritative sources was used and cited.

8.4 points

Provided a closing paragraph but the summary did not adequately address the content of the deliverable. Information from authoritative sources was used.

5.6 points

Attempted to provide a summary but this section was significantly lacking in content OR was not well supported by information drawn from authoritative sources. 

0 points

Section was missing or content was not relevant to the topic of this deliverable.

Score of Summary and Conclusions,

/ 14
*

Quality of Research, Citations, and References

14 points

Work was well researched and contains information paraphrased from at least 15 authoritative sources. Paraphrasing, citing, and reference list entries use a consistent format and include sufficient source identification information to allow the reader to fact-check the information presented in this deliverable.

 

12.6 points

Work was well researched and contains information paraphrased from  12 or more authoritative sources. Paraphrasing, citing, and reference list entries use a consistent format and include sufficient source identification information to allow the reader to fact-check the information presented in this deliverable.

11.2 points

Work was well researched and contains information paraphrased from  8 or more authoritative sources. Paraphrasing, citing, and reference list entries use a consistent format (minor inconsistencies allowed) and provides sufficient source information to allow the reader to fact-check the information presented in this deliverable.

8.4 points

Work shows some evidence of research and contains information paraphrased from at least 3 authoritative sources. Inconsistencies in formatting and/or missing citation and publication information make it difficult to fact check some sources.

 

5.6 points

Work has minimal research and/or fundamentally fails to appropriately use and cite information from authoritative sources. OR the work was not well supported by information from authoritative sources.

0 points

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Score of Quality of Research, Citations, and References,

/ 14
*

Organization & Appearance

7 points

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

5.6 points

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

4.2 points

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

2.8 points

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

1.4 points

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

0 points

No work submitted.

Score of Organization & Appearance,

/ 7
*

Execution

14 points

No formatting, grammar, spelling, or punctuation errors.

11.2 points

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

9.8 points

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.

8.4 points

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

5.6 points

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.

0 points

No work submitted.

Score of Execution,

/ 14
*

Total

Score of OSINT Tech Research Project,

/ 140
*

Overall Score

Excellent

126 points minimum

Outstanding

112 points minimum

Acceptable

98 points minimum

Needs Improvement

78.4 points minimum

Needs Significant Improvement

50.4 points minimum

Missing or Unacceptable

0 points minimum

Unable to save changes. There may be a problem with your connection.

Submit Assignment
There was an error submitting your text or file to the folder. Please fill in the text submission or re-submit the files.

Files to submit

(0) file(s) to submit
After uploading, you must click Submit to complete the submission.

Add a FileRecord AudioRecord Video

Comments

Paragraph

Close

Paragraph

Heading 1

Heading 2

Heading 3

Heading 4

Blockquote

Code

Paragraph

Close

Paragraph

Heading 1

Heading 2

Heading 3

Heading 4

Blockquote

Code

Close

Underline

Strike-through

Superscript

Subscript

Close

Bold

Italic

Underline

Strike-through

Superscript

Subscript

Select Color

Close

Left

Center

Right

Justify

Left to Right

Right to Left

Close

Bulleted List

Numbered List

Increase Indent

Decrease Indent

Close

Graphical Equation

LaTeX Equation

MathML Equation

Chemistry Equation

Close

Insert Table

1 column by 1 row

More Options

Cell

Cell

Cell Properties

Merge Cells

Split Cell

Row

Row

Insert Row Before

Insert Row After

Delete Row

Row Properties

Cut Row

Copy Row

Paste Row Before

Paste Row After

Column

Column

Insert Column Before

Insert Column After

Delete Column

Cut Column

Copy Column

Paste Column Before

Paste Column After

Sort

Sort

Sort by Column Ascending

Sort by Column Descending

Advanced Sort

Table Properties

Delete Table

Close

Equation

Equation

Graphical Equation

LaTeX Equation

MathML Equation

Chemistry Equation

Table

Table

Insert Table

1 column by 1 row

More Options

Cell

Cell

Cell Properties

Merge Cells

Split Cell

Row

Row

Insert Row Before

Insert Row After

Delete Row

Row Properties

Cut Row

Copy Row

Paste Row Before

Paste Row After

Column

Column

Insert Column Before

Insert Column After

Delete Column

Cut Column

Copy Column

Paste Column Before

Paste Column After

Sort

Sort

Sort by Column Ascending

Sort by Column Descending

Advanced Sort

Table Properties

Delete Table

Insert Stuff

Insert Quicklink

Insert Image

Attributes

Divider

Emoji

Symbols

Insert Code

Lato (Recommended)

Close

Arabic Transparent

Arial

Comic Sans

Courier

Ezra SIL

Georgia

Lato (Recommended)

SBL Hebrew

Simplified Arabic

Tahoma

Times New Roman

Traditional Arabic

Trebuchet

Verdana

돋움 (Dotum)

宋体 (Sim Sun)

細明體 (Ming Liu)

19px (Default)

Close

10px

12px

14px

16px

19px (Default)

20px

24px

32px

48px

Close

Font

Font

Arabic Transparent

Arial

Comic Sans

Courier

Ezra SIL

Georgia

Lato (Recommended)

SBL Hebrew

Simplified Arabic

Tahoma

Times New Roman

Traditional Arabic

Trebuchet

Verdana

돋움 (Dotum)

宋体 (Sim Sun)

細明體 (Ming Liu)

Font Size

Font Size

10px

12px

14px

16px

19px (Default)

20px

24px

32px

48px

Close

Preview

Source Code

Accessibility Checker

Word Count

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER