Describes the characteristics and motivations of the


Assignment: A High Profile Hack

Learning Objectives and Outcomes

- Describe a high-profile hacking incident.
- Discuss the characteristics and motivations of the threat, and detail how the attack progressed through each phase of the Cyber Kill Chain.

Assignment Requirements

You work for General Technology Security, Inc. (GTSI), a military contractor specializing in information systems security. GTSI has recently established a company initiative, referred to as Pro-action!, to become more proactive in IT security matters.

Your manager explained that part of the initiative involves researching past hacking attacks to establish patterns to identify potential vulnerabilities and anticipate future hacking attempts. Your team is responsible for profiling past incidents and spotting trends.

For this assignment:

- Research a recent high-profile hacking incident.
- Write a report that:

o Provides an overview of the attack
o Describes the characteristics and motivations of the threat
o Details, as much as possible, how the attack progressed through each phase of the Cyber Kill Chain

Recommended Resources

- Course textbook
- Internet access

Submission Requirements

- Format: Microsoft Word or compatible
- Font: Arial, 12-point, double-space
- Citation Style: Follow your school's preferred style guide
- Length: 1-2 pages

Self-Assessment Checklist

- I researched a recent high-profile hacking incident.
- I wrote a report that:

o Provides an overview of the attack
o Describes the characteristics and motivations of the threat
o Details, as much as possible, how the attack progressed through each phase of the Cyber Kill Chain

- I followed the submission requirements.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Describes the characteristics and motivations of the
Reference No:- TGS01280446

Now Priced at $30 (50% Discount)

Recommended (94%)

Rated (4.6/5)