Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

INFO 6087 - NETWORKING & SECURITY I: LAB 9 CYBER SECURITY CASE ANALYSIS Part 1: Setup (20 minutes) Break out into groups of 2

image text in transcribed

INFO 6087 - NETWORKING & SECURITY I: LAB 9 CYBER SECURITY CASE ANALYSIS Part 1: Setup (20 minutes) Break out into groups of 2 or 3 Search for a recent case where there has been a cyber security incident and prepare an analysis of the case using the guidelines below This should involve some aspect of technology and be either a case where there has been a breach or compromise of confidentiality, integrity or privacy This could be a case where such a breach was prevented Part 2: Case Summarization (30 minutes) Discuss and write a brief (2 or 3 paragraph) summary of the case in question Identify what area of technology is in question Identify who the threat actor(s) are/were Identify who the target is Identify what actions were taken in the attack Identify what actions were taken to mitigate the incident Identify how the breach/threat was identified Part 3: Case Analysis (30 minutes) Analyze the specifics of your chosen case based on the materials covered in our slides: What kind of data was affected? What legal protections are there for such data - PCI etc. What were the attackers trying to achieve - financial gain, reputation etc.? What areas of the CIA triad were impacted? Was this an internal or external threat? Was this exploit well known or zero day? Was this a software or hardware vulnerability? What kind of malware, if any, was used? Was social engineering used? How was the attack conducted - malware, phishing etc.? Part 4: Case Discussion (30 minutes) Groups should be prepared to present and discuss their findings with another group as assigned by the lab professor Each group should give a brief, 15 minuet synopsis of their chosen event including the issues highlighted above and answer questions on their case

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James Kurose, Keith Ross

7th edition

978-0133594140

More Books

Students also viewed these Computer Network questions

Question

Do the measurement items or tools have content relevance?

Answered: 1 week ago