Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Assignment on Researching and Reporting on a Cyberattack in the Past 10 Years

Assignment Requirements

By completing BOX B below, we certify that the submission is entirely ours and that any material derived or quoted from the published or unpublished work of other persons has been duly acknowledged. [ref. UPR AS/C/6.1, section 7 and UPR AS/C/5 (Appendix III)]. )].  I also certify, that any work with human participants has been carried out under an approved ethics protocol in accordance with UPR RE01.

Please ONLY provide your ID (srn) number as this assignment will be anonymously marked and actual time spent on the assignment.  By BOX B below you certify that this work represents equal contributions from all team members. If this is not the case, the module leader must be informed before submission.

1.For undergraduate modules, a score of 40% or above represents a pass mark.

2.For postgraduate modules, a score of 50% or above represents a pass mark.

3.For work submitted up to 5 working days late marked is capped to a bare pass (40% for undergraduate and 50% for postgraduate).

For work submitted more than 5 working days a mark of zero will be awarded for the assignment.

THE ASSIGNMENT TASK:

This is an individual assignment.

You work for Cyber Operations Inc (CyOps). CyOps is a military contractor specialising in information systems security.

CyOps has decided to create a library of past cyberattacks for intelligence purposes. The aim is when a new attack is being investigated, comparisons may be made with previous attacks. These comparisons can help CyOps identify the perpetrators and can offer clues about how the attack was waged.

CyOps has information about several famous cyberattacks including Solar Sunrise, Moonlight Maze, Honker Union, Code Red, SQL Slammer, Titan Rain, Stakkato, Poison Ivy, Senior Suter, Stuxnet, Operation Aurora, Duqu, Flame, FOXACID, and Careto.

•Research one of the aforementioned cyberattacks that have occurred in the past 10 years.  

•Select only one and write a 1500 words report that includes information about:

oThe target information environment

oHow the attack worked (technical explanation)

oThe damage caused by the attack (impact on business processes)

oHow the attack was detected (comment on incident response process)

oThe perpetrator (type of threat agent)

•Create a table summarising your findings.

You are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.

1.Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access

2.Develop a deep and systematic understanding and knowledge of current theoretical and methodological approaches to offensive Cyber Operation concepts and philosophies

3.Critically reflect on the implementation and management of offensive Cyber Operations at all levels

4.Critically reflect on the implementation and management of defensive Cyber Operations at all levels

5.Apply with flexibility and creativity originality in the application of the different types of cyber operations and their utilization and deployment based on the scenario at hand  

6.Design and undertake substantial investigations under the context of situational awareness

7.Demonstrate self-direction and creativity in designing and developing a cyber defence environment

support
close