Reference no: EM133520648
Question 1: Abstract (A brief summary of the research topic you have chosen with the major aspects of the entire research and what you have investigated).
Question 2: Introduction to how the cyberattack happened (Outline of how the attack happened. You should produce a timeline of events)
Question 3: Technical details of the cyberattack (Explain the technical details of the chosen cyberattack)
Question 4: Model the attack on your given case (You are expected to produce an attack tree that shows possible attack methods used)
Question 5: Discuss how the attack was detected (Identify how the attack was detected by network and web administrators. What was the response of various detection and prevention system that could be installed (firewall, antivirus, intrusion detection/prevention system)
Question 6: Technical risks associated with the cyberattack (Identify the various infrastructure that were vulnerable during your chosen cyber attack. You are not expected to produce a risk assessment but list technical risks and associated vulnerabilities and explain each briefly)
Question 7: Business risks associated with the cyberattack (Identify business risks and losses associated with your chosen cyberattack)
Question 8: Discuss of how the attack can be prevented and mitigated (Identify the various methods that can be/ could have been used to mitigate or prevent this attack)