Reference no: EM133157353 , Length: 3000 words
Detailed Instructions
This is an individual assessment. It is expected that the report will be in the region of 3000 words. You work as an analyst for Cyber Operations Inc (CyOps). CyOps is a military contractor specialising in information systems security. CyOps has decided to create a library of past cyberattacks for intelligence purposes. The aim is when a new attack is being investigated, comparisons may be made with previous attacks. These comparisons can help CyOps identify the perpetrators and can offer clues about how the attack was waged.
CyOps has information about several famous cyberattacks including Solar Sunrise, Moonlight Maze, Honker Union. Code Red. SQL Slammer, Titan Rain. Stakkato, Poison Ivy, Senior Suter, Stuxnet, Operation Aurora, Duqu, Flame. FOXACID, and Careto.
For this assignment:
- Research one of the afore mentioned cyberattacks that have occurred in the past.
. Select only one and write a 3000 words report that includes information about:
o The target information environment
- Comment on: boundaries, stakeholders, assets, business processes
o How the attack worked
- Technical explanation of the attack commenting on the exploitation opportunity and a technical analysis of the exploited vulnerability
o The damage caused by the attack
- impact on business processes and on every other impact field
o How the attack was detected
- comment on the incident response process explicitly referring to each IR stage
o The perpetrator
- Comment on the type of threat agent and its motivation and capability attributes.
The perpetrator
- Comment on the type of threat agent and its motivation and capability attributes
- Create a table summarising your findings.
You are expected to use appropriate peer reviewed sources for developing your arguments. and the Harvard referencing style as per the University regulations. You are expected to provide at least 20 peer-reviewed references.