Cybersecurity II
LAW 746 Section 81
Tiffany McClaskey
Module 1 Declare a Cyber Attack Methods Project
In this project, each of you will select one of the following 10 Cyber Attack Methods (CAMs). Research (at a high level) each of these methods. Choose wisely; you will remain with your choice throughout the semester. You’ll be researching it further, discussing it in posts, and completing assignments related to this topic. You will respond to a discussion post titled “Module 1: Cyber Attack Method Proclamation” in which you identify your desired attack method (1 through 10 here), describe why you selected this vector, and provide a brief explanation for it (research is required with citation).
Almost every module this semester will have a new discussion post related to this project. It is recommended that you capture each of your module project assignments and any pertinent feedback in a separate word document… (You’ll thank me when you get to Module 11 😉).
NOTE: Each attack vector can only be selected 2 times. Please review previous posts to ensure that you are not the third person to select an attack vector. (First come, first served). The deliverables are as follows:
10 Cyber Attack Methods (CAMs):
- Ransomware Attack: ENCRYPTION/DECRYPTION
- Malware infestation: KEYSTROKE LOGGER
- Crack the Hash: HASH FUNCTION(S)
- Man in the middle: PACKET SNIFFING
- Unauthorized access to data: SQL INJECTION VULNERABILITY ASSESSMENT
- Email security: SPAM PHISHING
- Back Door: WEAPONIZED SUPPLY CHAIN
- Financial compromise: PAYMENT CARD
- Data Exfiltration: FIREWALL INTRUSION
- Credentials stolen: CREDENTIAL HARVESTING EXERCISE
NOTE: You will have until 11:59 p.m. Thursday to respond to this prompt. You will be required to respond to 2 other students’ prompt responses by 11:59 p.m. Sunday. (See syllabus “Cyber Project Discussions and Assignments” information.)