You work for Cyber Operations Inc (CyOps). CyOps is a military contractor specialising in information systems security.
CyOps has decided to create a library of past cyberattacks for intelligence purposes. The aim is when a new attack is being investigated, comparisons may be made with previous attacks. These comparisons can help CyOps identify the perpetrators and can offer clues about how the attack was waged. CyOps has information about several famous cyberattacks including Solar Sunrise, Moonlight Maze, Honker Union, Code Red, SQL Slammer, Titan Rain, Stakkato, Poison Ivy, Senior Suter, Stuxnet, Operation Aurora, Duqu, Flame, FOXACID, and Careto.
For this assignment:
• Research cyberattacks that have occurred in the past 10 years.
• Identify one high prestigious attack that is not mentioned above.
• Write 1500 words report that includes information about:
o The target
o How the attack worked
o The damage caused by the attack
o How the attack was detected
o The perpetrator
• Create a small table summarising your findings.
You are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.
1. Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access
2. Develop a deep and systematic understanding and knowledge of current theoretical and methodological approaches to offensive Cyber Operation concepts and philosophies
3. Critically reflect on the implementation and management of offensive Cyber Operations at all levels
4. Critically reflect on the implementation and management of defensive Cyber Operations at all levels
5. Apply with flexibility and creativity originality in the application of the different types of cyber operations and their utilization and deployment based on the scenario at hand
6. Design and undertake substantial investigations under the context of situational awareness
7. Demonstrate self-direction and creativity in designing and developing a cyber defence environment