Reference no: EM133856009
Homework: Cyber Security
In this homework, you will choose and examine a significant cybercrime/cyberattack/data breach that interests you. "Significant" means that the breach was serious enough to warrant attention by the news media and has provided enough coverage in news, trade, and scholarly literature to allow you to find sufficient research for this homework.
You will review information on the attack and produce a case study that summarizes the events and impacts.
Step I
A. Choose a significant cybercrime/cyberattack/data breach
Step II
A. Conduct research
1. Explore 3-5 websites to examine different perspectives about the breach you have chosen. Refrain from relying on blogs as sources. To find credible sources, you might begin with the UMGC Library using OneSearch, Google Scholar, or web search (Google), government websites, and professional organizations.
Step III
A. After reviewing the information on your chosen cybercrime/cyberattack, write a case study to summarize the case.
B. The case study should be written in paragraphs so that points have elaboration and connections that make it easy to understand the case.
C. For your case study, follow these steps:
1. Begin with information about the victim, which will be a company, organization, agency or person.
2. Include discussion of information about the victim to give context to the event. For example, if the victim is a company, then include its work, mission, location and other relevant points. If the victim is a person, report enough information so that the reader can understand the individual and the situation.
3. Provide a brief overview of the attack.
4. Create a timeline of the cybercrime or attack (details will vary based on how much information is shared in published documents). Be sure the timeline accounts for when the attack began, when it ended, and what happened between those times. The timeline format can be presented in chronological order with bullet points. The timeline can be presented in past-to-present format or present-to-past, if you are consistent.
5. Identify the reported risks and vulnerabilities that made the attack possible. Consider why the attack happened to the company or person.
6. Discuss the costs and/or damages from the attack. Costs can include finances, reputation, customers, and other types of impacts.
7. Report the prevention measures stated by cybersecurity practitioners. Summarize what was learned from the event in a way that could help limit future victimization.
8. Identify any factors that were not discussed but that you believe could impact future cybercrimes. Consider risk factors and aspects that create vulnerabilities.