Answered You can hire a professional tutor to get the answer.

QUESTION

IntroductionFor the course project, you are to select a recent (within the last five years) significant security attack. You will research the incident and write a report on your findings. In the repo

Introduction

For the course project, you are to select a recent (within the last five years) significant security attack. You will research the incident and write a report on your findings. In the report, you will take the role of a security consultant contracting by an investment firm. Your report will be read by mostly non-technical executives at the investment firm. In order to ensure that your client have a good understanding of your report, in addition to describing the incident, its causes, its results, its costs, and steps that could have been/should be taken, you will also have to explain the technical terminology, concepts, techniques, and tools that you use and discuss in the report.

It is very important that you include all references you use for the report. Your report should conclude with a section title “References” that includes the list of resources that you used to write your report. Use the website to guide you in how to format the references to your resources: http://www.bibme.org/citation-guide/apa.

In addition to simply listing your references at the end of the report, your must also use citations to the references within your report text. Any fact, opinion, quote, or other information that you use in your report should include a citation that refers to one of your references. Again, refer to the above website for how to do this. In general, if a source is included in your references, it should be cited in your report at least once.

Report Content

Your report should, of course, describe the incident in as much detail as possible. You should attempt to classify the attack as being on confidentially, integrity, or availability (or some combination of these).

When discussing how the attack was carried out, be sure to clearly identify all factors:

• technical

• human

• physical

that were used to carry out the attack.

Include a discussion of the apparent motivation for the attack if one was clearly identified or theories of motivation if

not.

Go into as much detail as possible regarding the attack itself and how it was carried out. Identify the vulnerabilities that allowed the attack. Classify the process of the attack.

Discuss the results of the incident:

• what was taken

• what was destroyed

• what was made unavailable

• who was affected

• what was the harm done

• what was the cost to the different groups affected by the attack

• when were affected group notified of the attack

Finally, looking at the attack process and vulnerabilities exploit, described what measures should be taken to prevent future attacks of the type. Here be sure to clearly identify and cite measures mentioned in one of your sources. If you have your own suggestions, clearly identify them as your own.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question