Reference no: EM133453901
Case Scenario: In this futuristic scenario, the cyber attack targets smart homes in a major city, which are connected to a centralized smart grid system. The smart homes include smart thermostats, smart security cameras, and smart locks, all connected to the internet of things (IoT). The CTAs launch a DDoS attack on the smart grid system, which leads to a massive blackout and disruption of the city's power supply. Once the smart grid system is down, the CTAs then use the IoT devices in the smart homes to launch a ransomware attack, encrypting all the data in the homes and demanding payment for its release.
Questions:
intelligence requirement (IR) - How many CTAs conduct cyber attacks on smart city projects?
Priority intelligence requirements (PIR) - Why would CTAs conduct these types of cyber attacks on smart city projects?
How might they use deception and information warfare, such as manipulation of information without the target being aware of it?
How can organizations respond such as mitigation approaches?
After this attack, what do you think CTAs may do next?
Answer these IR and PIR questions using PEST analysis to analyze the victim feature of the Diamond Model of Intrusion Analysis. Then use the defense in depth methodology to answer the IR and PIR questions by analyzing the infrastructure feature. Then for the Capabilities feature do the same thing with the Cyber Kill Chain and finally with the adversaries use both the MITRE framework and the Motive, Opportunity & Means methodology to analyze and answer.