Question: INFO 6087 - NETWORKING & SECURITY I: LAB 9 CYBER SECURITY CASE ANALYSIS Part 1: Setup (20 minutes) Break out into groups of 2

INFO 6087 - NETWORKING & SECURITY I: LAB 9 CYBER SECURITY CASE

INFO 6087 - NETWORKING & SECURITY I: LAB 9 CYBER SECURITY CASE ANALYSIS Part 1: Setup (20 minutes) Break out into groups of 2 or 3 Search for a recent case where there has been a cyber security incident and prepare an analysis of the case using the guidelines below This should involve some aspect of technology and be either a case where there has been a breach or compromise of confidentiality, integrity or privacy This could be a case where such a breach was prevented Part 2: Case Summarization (30 minutes) Discuss and write a brief (2 or 3 paragraph) summary of the case in question Identify what area of technology is in question Identify who the threat actor(s) are/were Identify who the target is Identify what actions were taken in the attack Identify what actions were taken to mitigate the incident Identify how the breach/threat was identified Part 3: Case Analysis (30 minutes) Analyze the specifics of your chosen case based on the materials covered in our slides: What kind of data was affected? What legal protections are there for such data - PCI etc. What were the attackers trying to achieve - financial gain, reputation etc.? What areas of the CIA triad were impacted? Was this an internal or external threat? Was this exploit well known or zero day? Was this a software or hardware vulnerability? What kind of malware, if any, was used? Was social engineering used? How was the attack conducted - malware, phishing etc.? Part 4: Case Discussion (30 minutes) Groups should be prepared to present and discuss their findings with another group as assigned by the lab professor Each group should give a brief, 15 minuet synopsis of their chosen event including the issues highlighted above and answer questions on their case

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!