Reference no: EM133190598
It is important to think about technologies that exist today that did not exist 20 years ago.
Part 1) Research a historical cyber attack, from within the past 10 years. Put together a case document/report covering the key aspects of the attack. Use the attached sample report (you may not have 100% of the answers). There is even a document that can be used by you as a resource. use the attached document as a template
Part 2) Technology has come a long way over the past decade. What types of cybercrimes exist today that did not exist 10 years ago? Are people more susceptible of being a victim of a cybercrime than a traditional crime? apa format cite cource
Cyber Security Incident Report Format
1. INTRODUCTION
This document provides a format for reporting cyber security incidents at contractor entities, when there is a national reporting requirement to do so.
2. SCOPE
The attached Cyber Security Incident Report format has been approved by the MISWG participants for reporting cyber security incidents at contractor entities. This form may also be used to document and triage INFOSEC and other related incidents.
The aim of this cyber security incident report is to be used by the security or other appropriate officers of industrial facilities to immediately document and report loss/compromise, suspected compromise, suspicious contact, or activity involving systems accredited to process classified information. It may be used as a preliminary response to supplement national reporting requirements and provide a resource to document initial or first response to a cyber security incident.
The responsibility solely rests on national security authorities to adopt or not a form to report cyber security incidents. The classification of the completed form depends on national regulations and therefore is required to be transmitted appropriately depending on the level of classification assigned to the report. The assumption is made that any security incident involving classified information and foreign government information, including assets and information stored, processed or generated, in relation to a contract or capability must be reported immediately to the appropriate national security authorities. In turn, they will collect initial details then advise who else should engage in the inquiry.