First Assignment Fall 2023 | CSU College of Law Skip to main content
Extended block content
 

Student Resources

Records, Forms, and Academic Information.
Extended block content
 

CSU|LAW Faculty Blog

Stay up to date on the work and achievements of our faculty.
Extended block content
 

CSU|LAW Hall of Fame

Extended block content
 
Building Access and Research Services

 
Law Library Blog
Extended block content
 
Dean's Living Justice Living Leadership Podcast

 
Monday Morning Message
Extended block content
 
Support CSU|LAW

 
CSU|LAW Hall of Fame
Extended block content
 

Request Information

Get in touch about in-person and virtual events, sharing updates and announcements.
Extended block content
First Assignment Fall 2023

Cybersecurity II

LAW 746 Section 81

Tiffany McClaskey


Assignment details

Module 1 Declare a Cyber Attack Methods Project

In this project, each of you will select one of the following 10 Cyber Attack Methods (CAMs). Research (at a high level) each of these methods. Choose wisely; you will remain with your choice throughout the semester. You’ll be researching it further, discussing it in posts, and completing assignments related to this topic. You will respond to a discussion post titled “Module 1: Cyber Attack Method Proclamation” in which you identify your desired attack method (1 through 10 here), describe why you selected this vector, and provide a brief explanation for it (research is required with citation). 

Almost every module this semester will have a new discussion post related to this project. It is recommended that you capture each of your module project assignments and any pertinent feedback in a separate word document… (You’ll thank me when you get to Module 11 😉).

NOTE: Each attack vector can only be selected 2 times. Please review previous posts to ensure that you are not the third person to select an attack vector. (First come, first served). The deliverables are as follows:

10 Cyber Attack Methods (CAMs):

  1. Ransomware Attack: ENCRYPTION/DECRYPTION
  2. Malware infestation: KEYSTROKE LOGGER
  3. Crack the Hash: HASH FUNCTION(S)
  4. Man in the middle: PACKET SNIFFING
  5. Unauthorized access to data: SQL INJECTION VULNERABILITY ASSESSMENT 
  6. Email security: SPAM PHISHING 
  7. Back Door: WEAPONIZED SUPPLY CHAIN 
  8. Financial compromise: PAYMENT CARD 
  9. Data Exfiltration: FIREWALL INTRUSION 
  10. Credentials stolen: CREDENTIAL HARVESTING EXERCISE

NOTE: You will have until 11:59 p.m. Thursday to respond to this prompt. You will be required to respond to 2 other students’ prompt responses by 11:59 p.m. Sunday. (See syllabus “Cyber Project Discussions and Assignments” information.)