Cybersecurity Internship Assignment
This assignment provides a structured approach to analyzing the "Pager Blast" cyber attack
and introduces you to IBM QRadar, a powerful cybersecurity tool.
Part 1: Attack Overview (75 words)
● Objective: Introduce the "Pager Blast" attack.
● Content:
○ Identify the official name and targeted entities of the attack.
○ Describe how the attack was executed, detailing any malware, phishing, or
vulnerabilities exploited by the attackers.
Part 2: Countermeasures (75 words)
● Objective: Explain response actions and preventive measures.
● Content:
○ Outline the immediate actions organizations implemented to mitigate the
attack’s effects.
○ Detail advanced preventative measures and tools that could protect against
similar incidents in the future.
Part 3: Role of OSINT in Cybersecurity (75 words)
● Objective: Explore OSINT’s significance in cyber threat detection.
● Content:
○ Explain how Open Source Intelligence (OSINT) contributed to tracking,
identifying, or assessing the threat actors involved.
○ Identify OSINT frameworks (e.g., Maltego, Shodan, SpiderFoot) and
significant contributors who have advanced OSINT practices.
Part 4: [Link]’s Impact on Cyber Threat Analysis (75 words)
● Objective: Assess [Link]’s role in threat analysis.
● Content:
○ Describe [Link]’s functionalities in locating and analyzing cyber threats.
○ Discuss how [Link] aids in predicting and preventing future cyber incidents.
Part 5: Visual Overview (Images & Diagrams)
● Objective: Provide a visual summary to enhance understanding.
● Content:
○ Include 5-7 images or diagrams that illustrate key points, such as:
■ Attack flowcharts
■ Screenshots of OSINT tools
■ Cyber threat maps
■ [Link] interface screenshots
■ Diagrams of cybersecurity response frameworks
○ Embed and caption these images within the document.
Part 6: Downloading IBM QRadar (75 words)
● Objective: Familiarize yourself with IBM QRadar for cyber threat analysis.
● Instructions:
○ Download IBM QRadar using the provided domain ID. (Contact your instructor
for the specific domain ID). Setting up IBM ID for the same-
IBM ID Setup Tutorial.mp4
○ Install the software, explore its features, and take note of QRadar's role in
detecting and analyzing threats.
Format Requirements
● Length: 300 words total, organized by the parts above.
● File Format: Submit as a PDF or Word document.
● Citations: List all sources in a brief reference section.
● Images: Ensure images are relevant, captioned, and referenced in the content.
By following these guidelines, you will gain a solid understanding of the "Pager Blast" cyber
attack, the role of OSINT, [Link], and the hands-on experience of using IBM QRadar in
threat detection.
Deadline- 6th November