UCF - CECS Research Paper 1 Cyberattack Case Study September 7, 2021 1 Cyberattack Case Study In this assignment you’ll write a short analysis of a significant cyberattack that: • Occurred in the last...

1 answer below »
The topic I have chosen to write about is the Facebook data breach of April 2019.Here is the link for an article I found on the topic.Feel free to look over many more articles that discuss the topic, and writing according to the description in the pdf attached, and using MLA at the end.Thank You!


UCF - CECS Research Paper 1 Cyberattack Case Study September 7, 2021 1 Cyberattack Case Study In this assignment you’ll write a short analysis of a significant cyberattack that: • Occurred in the last 5 years • Impacted more than one million accounts or had significant national or financial impact • Exposed personally identifiable information (PII) or caused significant military, infrastructure, political, or financial consequences/impact 1.1 Important report criteria Make sure your paper addresses the following items about the cyberattack that you’ve selected. • The history of its development – Is this attack the first from the attack’s creator? – Were previous attacks successful? – Was the attack sponsored by government entity, or a suspected governement entity? • The purpose of the attack • Its intended usage domain, and the general characteristics of the attack’s penetration strategy CIS3360-McAlpin RP 1 1 • One distinctive feature or trait that set it apart from other attacks, either historically or technologically • Whether it or any of its descendants remain in use, and why do those descendants still exist 1.1.1 Document requirements Make sure the report is formatted as follows: • 12 point font • 1 inch margins • Line spacing set to 1.5 • minimum 2 pages of text – More pages are allowed to provide for images – There is still the two pages of text minimum You need two references, one of which may be an online reference to the cyberattack and the other of which should be a manual, textbook, or contemporary article describing it. This is not a formal research paper but you must cite any source you use using the UCF APA Guidelines and Tools, and you must write all material in your own terms, not merely copy and paste. 1.1.2 Suggested Outline Please make sure that your paper addresses all the items in the Report Criteria. It will belp you to organize your paper based on the outline suggested below. 1. Introduction 2. History of development • Was the sponsor or creator a government agency or affiliate? • What was the motivation? (Money, strategic, infrastructure, etc.) Be specific. 3. History of attack with discussion of the attack’s impact on the chosen target(s) 4. General characteristics 5. Usage domain(s) - or target group(s) 6. Active descendants CIS3360-McAlpin RP 1 2 https://guides.ucf.edu/apa/citation-builders https://guides.ucf.edu/apa/citation-builders 7. What actions were taken to prevent similar attacks 8. What punitive actions were executed against the attacker(s) 1.2 Submission Instructions Submit your assignment to WebCourses as a Microsoft Word, OpenOffice or PDF file. 1.3 Grading The assignment shall be submitted via WebCourses. There should only be one file in the submission. That file should be a PDF, a WORD document, or an OpenOffice document. Make sure that your are clearly visible in the lower right corner of each page in the document. The page number should be in the upper right corner. 1.3.1 APA Citation Resources • Book Citation • Magazine or Journal Citation CIS3360-McAlpin RP 1 3 Table 1.1: Grading Rubric Deduction Description - 50 Report does not address financial, military, political, or strategic attack’s impact on integrity, confidentiality, or availability (CIA) - 50 No references or citations. - 5 APA Citations do not follow formatting recommendations shown below - 10 Does not address the attack’s history - origin (company or organization) - purpose (CIA?) - 10 Does not explain usage domain(s) or target(s), for example: - industrial controls - power/energy production - power/energy distribution - manufacturing - science - biology - chemistry - munitions - simulation - project management - games - etc. - 10 Does not address whether any active descendants still in use/development Start with 100 points and deduct per the schedule above • Full UCF APA Citation Guidance Rosen APA Guidelines CIS3360-McAlpin RP 1 4 https://guides.ucf.edu/apa/general-guidelines Cyberattack Case Study Important report criteria Document requirements Suggested Outline Submission Instructions Grading APA Citation Resources
Answered Same DaySep 26, 2021

Answer To: UCF - CECS Research Paper 1 Cyberattack Case Study September 7, 2021 1 Cyberattack Case Study In...

Deepti answered on Sep 27 2021
134 Votes
Introduction
This report analyzes the cyber attack of Facebook in 2019 that impacted millions of users by
exposing their personal information and making it visible online without appropriate consent. The report discusses the history of development of the attack, its purpose, intended usage domain, general characteristics, distinct feature and the descendants of the attack.
History
The attack was not proved to be sponsored by government entity. The purpose of the attack was to again access to the personal information of users like facebook ID, likes, comments, reaction data, names, phone numbers, location, email and other biological information and use this data to impersonate the users and commit fraud. It could be advantageous to commit social engineering attacks or hacking attempts. In 2017, according to a cyber security expert, Facebook introduced certain vulnerabilities in video uploader. While using “View As” for viewing user profile as someone else, the video uploader would appear when it should not appear on that screen. On appearing, it...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here