Project Part 2: Identifying Cyber Threats and Applying the Cyber Kill Chain Scenario

Project Part 2: Identifying Cyber Threats and Applying the Cyber Kill Chain

Scenario

The DoD has requested a review of the vulnerabilities of the Western Interconnection power grid computer network, with strategies for reducing or eliminating the vulnerabilities. They also want a brief profile of the cyber attackers, using the Adversary Model as a foundation. You must research this model, focusing on resources, capabilities, intent, motivation, risk aversion, and access.

Tasks

For this part of the project, perform the following tasks:

    1. Perform research and write a report that:
    2. Identify and describe a specific type of malware that could affect the Western Interconnection power grid computer network. Explain (in detail) how the malware could be installed in the network covertly and the action the malware would take to disrupt the network.
    3. Apply the Cyber Kill Chain to the identified malware, including a diagram that shows the steps to be taken to eradicate it (Yes, you may use Visio, Word, or PPT, to create a diagram to include in your submission)
    4. Apply the Adversary Model to the cyberattack group
    5. Cite sources where appropriate.

Suggested Resource(s) for the Adversary Model

  • https://www.networkworld.com/article/2227798/the-cold-war–then-and-now.html

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, 12-point, double-space
  • Citation style: APA
  • Length of report: 2–4 pages
PreviousNext

**HERE IS FEEDBACK FROM PART 1**

Overall, it is a good start to the project. The only issue I find is that you could have written a couple more sentences explaining the threats. Other than that, great job. Remember, when writing these projects, when it states “report,” write a report, not a research paper. I don’t keep up with APA formatting except for the title page, in-text citation, and references page, so try not to use definitions like in a research paper. So far, your group is writing it as a report, not a research paper. 🙂 It would be a great idea for your group to revisit the Project Overview and recapture the big picture of the end goal. The Project Overview also drops hints (Adversary Model, Cyber Kill Chain, and Defense in Depth) on approaching the project. The Project Overview states that “Your team has been informed by high-ranking officials that a foreign, government-based cyberattack group is suspected of hacking into computers that operate the U.S. Western Interconnection power grid to probe and map the network.” “Your company will work closely with the DoD and the North American Electric Reliability Corp to provide a plan that ensures the security and safety of the Western Interconnection power grid computer network. Keep this in mind when moving throughout the project. Overall, great job on the first part.

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.