**Cyber-Warfare Senior Assignment: Developing Cybersecurity Best Practices and Rules** **Executive Summary:** In this assignment, you will...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
**Cyber-Warfare Senior Assignment: Developing Cybersecurity Best Practices and Rules** **Executive Summary:** In this assignment, you will be tasked with creating a comprehensive set of cybersecurity best practices and rules based on five historical cyber-attacks: Morris Worm, Eligible Receiver, Solar Sunrise, Moonlight Maze, and Titan Rain. These rules will form the foundation for a real, usable document that any company or organization can employ to maintain assurance of their technological systems and data. Your assignment will involve: 1. Conducting in-depth research on each of the mentioned cyber-attacks to understand the methodologies, vulnerabilities exploited, and consequences. 2. Identifying common patterns and lessons learned from these attacks. 3. Developing a set of practical cybersecurity best practices and rules that address the vulnerabilities and methods employed in the selected cases. 4. Organizing and documenting these rules into a clear and usable format suitable for organizations to implement. Once you have created the cybersecurity rules document, you will proceed to analyze the Guam report and determine if the rules you have outlined would have prevented any or all parts of that specific incident. Your analysis should be specific, detailed, and provide a clear demonstration of how the rules could have mitigated the risks identified in the Guam report. **Assignment Details:** **Step 1: Research and Analysis (20%)** - Conduct thorough research on the Morris Worm, Eligible Receiver, Solar Sunrise, Moonlight Maze, and Titan Rain cyber-attacks. - Summarize the key details of each attack, including the attack vector, vulnerabilities exploited, and consequences. Identify common patterns, techniques, and vulnerabilities across these attacks. - **Step 2: Developing Cybersecurity Best Practices and Rules (40%)** - Based on your research, create a set of cybersecurity best practices and rules that organizations can follow to enhance their cybersecurity posture. - Ensure that these rules are practical, actionable, and relevant to modern cybersecurity threats. - Organize these rules into a clear and usable format, such as a policy document or handbook. **Step 3: Executive Summary (10%)** - Write an executive summary that introduces the assignment and provides a concise overview of the cybersecurity rules you have developed. **Step 4: Analyzing the Guam Report (20%)** - Obtain and review the Guam report, paying close attention to the details of the incident. - Explain, with specific references to your cybersecurity rules, how the rules you developed could have prevented or mitigated the risks and vulnerabilities identified in the Guam report. - Provide a clear, detailed analysis of the extent to which your rules would have been effective in preventing the incident. **Step 5: Documentation and Presentation (10%)** - Prepare a well-organized document that includes the executive summary, cybersecurity rules, and the analysis of the Guam report. - Ensure that your document is technically sound, follows a professional format, and is suitable for presentation to a company or organization. **Submission Guidelines:** - Submit your assignment in a professionally formatted document, such as a PDF. - Include proper citations for your research sources. - Ensure clarity, coherence, and organization in your writing. This assignment aims to challenge your understanding of cybersecurity concepts and your ability to apply them to real-world scenarios. It will also assess your skills in research, critical thinking, and documentation. Good luck! **Cyber-Warfare Senior Assignment: Developing Cybersecurity Best Practices and Rules** **Executive Summary:** In this assignment, you will be tasked with creating a comprehensive set of cybersecurity best practices and rules based on five historical cyber-attacks: Morris Worm, Eligible Receiver, Solar Sunrise, Moonlight Maze, and Titan Rain. These rules will form the foundation for a real, usable document that any company or organization can employ to maintain assurance of their technological systems and data. Your assignment will involve: 1. Conducting in-depth research on each of the mentioned cyber-attacks to understand the methodologies, vulnerabilities exploited, and consequences. 2. Identifying common patterns and lessons learned from these attacks. 3. Developing a set of practical cybersecurity best practices and rules that address the vulnerabilities and methods employed in the selected cases. 4. Organizing and documenting these rules into a clear and usable format suitable for organizations to implement. Once you have created the cybersecurity rules document, you will proceed to analyze the Guam report and determine if the rules you have outlined would have prevented any or all parts of that specific incident. Your analysis should be specific, detailed, and provide a clear demonstration of how the rules could have mitigated the risks identified in the Guam report. **Assignment Details:** **Step 1: Research and Analysis (20%)** - Conduct thorough research on the Morris Worm, Eligible Receiver, Solar Sunrise, Moonlight Maze, and Titan Rain cyber-attacks. - Summarize the key details of each attack, including the attack vector, vulnerabilities exploited, and consequences. Identify common patterns, techniques, and vulnerabilities across these attacks. - **Step 2: Developing Cybersecurity Best Practices and Rules (40%)** - Based on your research, create a set of cybersecurity best practices and rules that organizations can follow to enhance their cybersecurity posture. - Ensure that these rules are practical, actionable, and relevant to modern cybersecurity threats. - Organize these rules into a clear and usable format, such as a policy document or handbook. **Step 3: Executive Summary (10%)** - Write an executive summary that introduces the assignment and provides a concise overview of the cybersecurity rules you have developed. **Step 4: Analyzing the Guam Report (20%)** - Obtain and review the Guam report, paying close attention to the details of the incident. - Explain, with specific references to your cybersecurity rules, how the rules you developed could have prevented or mitigated the risks and vulnerabilities identified in the Guam report. - Provide a clear, detailed analysis of the extent to which your rules would have been effective in preventing the incident. **Step 5: Documentation and Presentation (10%)** - Prepare a well-organized document that includes the executive summary, cybersecurity rules, and the analysis of the Guam report. - Ensure that your document is technically sound, follows a professional format, and is suitable for presentation to a company or organization. **Submission Guidelines:** - Submit your assignment in a professionally formatted document, such as a PDF. - Include proper citations for your research sources. - Ensure clarity, coherence, and organization in your writing. This assignment aims to challenge your understanding of cybersecurity concepts and your ability to apply them to real-world scenarios. It will also assess your skills in research, critical thinking, and documentation. Good luck!
Expert Answer:
Answer rating: 100% (QA)
Cybersecurity Best Practices and Rules Document Executive Summary This document presents a comprehensive set of cybersecurity best practices and rules derived from the analysis of five historical cybe... View the full answer
Related Book For
Smith and Roberson Business Law
ISBN: 978-0538473637
15th Edition
Authors: Richard A. Mann, Barry S. Roberts
Posted Date:
Students also viewed these programming questions
-
Elle was 65 as of January 1st 2022. Her RRIF was established in 2020. On January 1, 2022, Elle's RRIF contained assets valued at $210,000, however, due to market fluctuations - her portfolio was...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Do some amendment and enhance the given research paper: Table of Content Abstract..3 Action Research.4 Research Methodology and Design...5 Literature Review: NoSQL Database7 Proposal.7 Iteration 1..8...
-
The name of each data Table in an Oracle Server database must be prefixed by the keyword or (True/False)
-
In Figure P28.21, show how to add just enough ammeters to measure every different current. Show how to add just enough voltmeters to measure the potential difference across each resistor and across...
-
Is a collective bargaining agreement binding on all union members?
-
Which form of financing requires repayment, regardless of whether the company receiving the funds does well or not? a. A loan b. An investment c. Both a loan and an investment d. Neither a loan nor...
-
The Piedmont Computer Company has brought legal action against ATC Corporation for alleged monopolistic practices in the development of software. The claim has been pending for two years, with both...
-
Hoteliers have been hard at work to leave a positive first impression on their valued guests for decades. It is a pivotal element of a hotel's reputation, as how guests first perceive a hotel can set...
-
Paul and Wayne equally own the PW Partnership. Paul's basis was $30,000 and Wayne's basis was $22,000 at the beginning of the year. PW Partnership had the following income and expense items:...
-
please find the critical values? Mummy's curse: King Tut was an ancient Egyptian ruler whose tomb was discovered and opened in 1923. Legend has it that the archaeologists who opened. the tomb were...
-
Solve the equation x-2 6x-5 = 219 x-2 X = Submit Question
-
Sherry just turned 72 years old and has not taken any distributions from her traditional IRA. What could happen if she does not take her required minimum distribution?
-
Jake is an IRS tax law - certified volunteer preparer at a VITA / TCE site. When preparing a return for Jill, Jake learns that Jill does not have a bank account to receive a direct deposit of her...
-
1. Calculate the following: a. What was the percentage change in total operating revenues from FY2015 to FY2019? b. What was the percentage change in total expenses (operating + non-operating) from...
-
Why does a more accurate cost for a product matter? Shouldn't the price be set based on market and competitive factors? What causes a product or customer to be highly unprofitable? When would a...
-
The sum of three digits a number is 17. The sum of square of the digits is 109. If we substract 495 from the number, the number is reversed. Find the number
-
Shreemaya Hotel in !adore was facing a problem of low demand for its rooms due to off season. The Managing Director (MD) of the hotel, Mrs. Sakina was very worried. She called upon the Marketing...
-
Jay Corporation, the largest manufacturer of bicycles in the United States, with 40 percent of the market, has recently entered into an agreement with Retail Bike, the largest retailer of bicycles in...
-
Mrs. Mieske delivered thirty-two fifty-foot reels of developed movie film to the Bartell Drug Company to be spliced together into four reels for viewing convenience. She placed the films, which...
-
Discuss the shelter rule and when a payee can have the rights of a holder in due course.
-
The number on the jersey of each New York Giants football player is recorded, then the mean of those numbers is computed. Decide whether the statement makes sense (or is clearly true) or does not...
-
A professor calculates final grades using a weighted mean in which the final exam counts twice as much as the midterm. Decide whether the statement makes sense (or is clearly true) or does not make...
-
The following ages (years) of survey respondents: 22, 19, 21, 27, over 65, over 80. State whether the mean or median would give a better description of the average. Explain your reasoning.
Study smarter with the SolutionInn App