0% found this document useful (0 votes)
128 views2 pages

1.1.6 Lab - Cybersecurity Case Studies - ILM

The document discusses a lab on cybersecurity case studies where students research and analyze four high profile cyberattacks, including Stuxnet, Marriott data breach, United Nations data breach, and Microsoft customer support database breach. Students select one attack to analyze further by answering questions about the victims, technologies used, timeline, systems targeted, attackers' motivation and goals, and attack outcome.

Uploaded by

hazwan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views2 pages

1.1.6 Lab - Cybersecurity Case Studies - ILM

The document discusses a lab on cybersecurity case studies where students research and analyze four high profile cyberattacks, including Stuxnet, Marriott data breach, United Nations data breach, and Microsoft customer support database breach. Students select one attack to analyze further by answering questions about the victims, technologies used, timeline, systems targeted, attackers' motivation and goals, and attack outcome.

Uploaded by

hazwan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Lab - Cybersecurity Case Studies (Instructor Version)

Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.

Objectives
Research and analyze cyber security incidents.
Part 1: Conduct search of high profile cyberattacks.
Part 2: Write an analysis of a cyberattack.

Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and experts
predict that these attacks are likely to increase in the future. Cybersecurity education is a top international
priority as high-profile cyber-security related incidents raise the fear that attacks could threaten the global
economy. The Center for Strategic and International Studies estimates that the cost of cybercrime to the
global economy is more than $600 billion annually. In this lab, you will study four high profile cyberattacks and
be prepared to discuss the who, what, why and how of each attack.

Required Resources
 PC or mobile device with internet access

Instructions

Part 1: Conduct search of high profile cyberattacks.


a. Using your favorite search engine conduct a search for each of the cyberattacks listed below. Your search
will likely turn up multiple results ranging from news articles to technical articles.
o The Stuxnet Virus
o Marriott data breach
o United Nations data breach
o Microsoft customer support database breach
o Lifelabs data breach
Note: You can use the web browser in virtual machine installed in a previous lab to research the hack. By
using the virtual machine, you may prevent malware from being installed on your computer.
b. Read the articles found from your search in Step 1a and be prepared to discuss and share your research
on the who, what, when, where, and why of each attack.

Part 2: Write an analysis of a cyberattack.


Select one of the high-profile cyberattacks from Step 1a and write an analysis of the attack that includes
Questions:
answers to the questions below.
a. Who were the victims of the attacks?
Type your answers here.

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
Lab - Cybersecurity Case Studies

Answers will vary based on the cyberattack chosen.


b. What technologies and tools were used in the attack?
Type your answers here.

The answers will vary based on the cyberattack chosen.


c. When did the attack happen within the network?
Type your answers here.

The answers will vary based on the cyberattack chosen.


d. What systems were targeted?
Type your answers here.

The answers will vary based on the cyberattack chosen.


e. What was the motivation of the attackers in this case? What did they hope to achieve?
Type your answers here.

The answers will vary based on the cyberattack chosen.


f. What was the outcome of the attack? (stolen data, ransom, system damage, etc.)
Type your answers here.

The answers will vary based on the cyberattack chosen.


End of document

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com

You might also like