Lab - Cybersecurity Case Studies (Instructor Version)Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.ObjectivesResearch and analyze cyber...

1 answer below »
Lab - Cybersecurity Case Studies (Instructor Version)Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.ObjectivesResearch and analyze cyber security incidentsBackground / ScenarioGovernments, businesses, and individual users are increasingly the targets of cyberattacks and experts predict that these attacks are likely to increase in the future. Cybersecurity education is a top international priority as high-profile cyber-security related incidents raise the fear that attacks could threaten the global economy. The Center for Strategic and International Studies estimates that the cost of cybercrime to the global economy is more than $400 billion annually and in the United State alone as many as 3000 companies had their systems compromised in 2013. In this lab you will study four high profile cyberattacks and be prepared to discuss the who, what, why and how of each attack.Required Resources•PC or mobile device with Internet accessStep 1: Conduct search of high profile cyberattacks.a.Using your favorite search engine conduct a search for each of the cyberattacks listed below. Your search will likely turn up multiple results ranging from news articles to technical articles.Home Depot Security BreachTarget Credit Card BreachThe Stuxnet VirusSony Pictures Entertainment HackNote: You can use the web browser in virtual machine installed in a previous lab to research the hack. By using the virtual machine, you may prevent malware from being installed on your computer.b.Read the articles found from your search in step 1a and be prepared to discuss and share your research on the who, what, when, where, and why of each attack.Step 2: Write an analysis of a cyberattack.Select one of the high-profile cyberattacks from step 1a and write an analysis of the attack that includes answers to the questions below.a.Who were the victims of the attacks?________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________Answers will vary based on the cyberattack chosen.b.What technologies and tools were used in the attack?________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________The answers will vary based on the cyberattack chosen.c.When did the attack happen within the network?________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________The answers will vary based on the cyberattack chosen.d.What systems were targeted?________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________The answers will vary based on the cyberattack chosen.e.What was the motivation of the attackers in this case? What did they hope to achieve?________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________The answers will vary based on the cyberattack chosen.f.What was the outcome of the attack? (stolen data, ransom, system damage, etc.)________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________The answers will vary based on the cyberattack chosen.
Answered Same DayApr 16, 2021

Answer To: Lab - Cybersecurity Case Studies (Instructor Version)Instructor Note: Red font color or gray...

Deepti answered on Apr 21 2021
157 Votes
Step 1
Home Depot Security Breach
This breach occurred at Home Depot, USA in September, 2014 where
a retail breach of payment card information took place stealing 53 million email addresses and 56 million credit and debit card details through the use of RAM scraping malware, stolen third party vendor credentials. The factors responsible for the attack to some extent were outdated software used at the company due to cost cutting on security and shared access granted to retailer’s networks. The criminals reset the PIN on victim’s payment card by breaching into the automated systems and then use a copy of the card for cash withdrawls.
Target Credit Card Breach
This breach occurred at Target Corporation, USA in Nov. 2013. Cyber attackers used credentials stolen from a third-party vendor. Ruslan Bondars, a 37-year-old Latvian programmer created the malware used by the cyber attackers for the theft. 41 million customer payment card accounts...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here