{"id":27763,"date":"2024-06-10T01:27:04","date_gmt":"2024-06-10T01:27:04","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/project-part-2-identifying-cyber-threats-and-applying-the-cyber-kill-chain-scenario\/"},"modified":"2024-06-10T01:27:04","modified_gmt":"2024-06-10T01:27:04","slug":"project-part-2-identifying-cyber-threats-and-applying-the-cyber-kill-chain-scenario","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/project-part-2-identifying-cyber-threats-and-applying-the-cyber-kill-chain-scenario\/","title":{"rendered":"Project Part 2: Identifying Cyber Threats and Applying the Cyber Kill Chain Scenario"},"content":{"rendered":"<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-left: 84px; cursor: auto; color: inherit;\">\n<div style=\"margin-left: 192px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"padding: 36px 48px 48px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"padding: 0px 24px 0px 12px; cursor: auto; color: inherit;\" data-lti-page-content=\"true\" data-resource-id=\"386355\" data-resource-type=\"wiki_page.body\">\n<h2 style=\"margin: 6px 0px; font-size: 1.8em; line-height: 1.5; cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; cursor: auto; color: inherit;\">Project Part 2: Identifying Cyber Threats and Applying the Cyber Kill Chain<\/span><\/strong><\/span><\/h2>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Scenario<\/strong><\/span><\/h4>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">The DoD has requested a review of the vulnerabilities of the Western Interconnection power grid computer network, with strategies for reducing or eliminating the vulnerabilities. They also want a brief profile of the cyber attackers, using the Adversary Model as a foundation. You must research this model, focusing on resources, capabilities, intent, motivation, risk aversion, and access.<\/p>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Tasks<\/strong><\/span><\/h4>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">For this part of the project, perform the following tasks:<\/p>\n<ol style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">\n<ol style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Perform research and write a report that:<\/li>\n<li style=\"cursor: auto; color: inherit;\">Identify and describe a specific type of malware that could affect the Western Interconnection power grid computer network. Explain (in detail) how the malware could be installed in the network covertly and the action the malware would take to disrupt the network.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Apply the Cyber Kill Chain to the identified malware, including a diagram that shows the steps to be taken to eradicate it (Yes, you may use Visio, Word, or PPT, to create a diagram to include in your submission)<\/li>\n<li style=\"cursor: auto; color: inherit;\">Apply the Adversary Model to the cyberattack group<\/li>\n<li style=\"cursor: auto; color: inherit;\">Cite sources where appropriate.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto;\">Suggested Resource(s) for the Adversary Model<\/h4>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">https:\/\/www.networkworld.com\/article\/2227798\/the-cold-war&#8211;then-and-now.html<\/li>\n<\/ul>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Submission Requirements<\/strong><\/span><\/h4>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Format: Microsoft Word (or compatible)<\/li>\n<li style=\"cursor: auto; color: inherit;\">Font: Arial, 12-point, double-space<\/li>\n<li style=\"cursor: auto; color: inherit;\">Citation style: APA<\/li>\n<li style=\"cursor: auto; color: inherit;\">Length of report: 2\u20134 pages<\/li>\n<\/ul>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\" aria-label=\"Module Navigation\">\n<div style=\"padding-top: 12px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\" data-html-tooltip-title=\"<i class='icon-document'><\/i> PROJECT OVERVIEW&#8221; data-tooltip=&#8221;right&#8221;><a style=\"padding: 8px 14px; font-size: 1rem; line-height: 22px; cursor: auto;\" aria-label=\"Previous Module Item\" aria-describedby=\"msf0-previous-desc\"><i style=\"line-height: 1; cursor: auto; color: inherit;\"><\/i>Previous<\/a><\/span><span style=\"cursor: auto; color: inherit;\" data-html-tooltip-title=\"<i class='icon-assignment'><\/i> Group Project Part 2: upload your assignment here&#8230;&#8221; data-tooltip=&#8221;left&#8221;><a style=\"padding: 8px 14px; font-size: 1rem; line-height: 22px; cursor: auto;\" aria-label=\"Next Module Item\" aria-describedby=\"msf0-next-desc\">Next<i style=\"line-height: 1; cursor: auto; color: inherit;\"><\/i><\/a><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\" aria-live=\"assertive\"><\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p>**HERE IS FEEDBACK FROM PART 1**<\/p>\n<div><span style=\"font-size: 14px; cursor: auto; color: inherit;\">Overall, it is a good start to the project. The only issue I find is that you could have written a couple more sentences explaining the threats. Other than that, great job. Remember, when writing these projects, when it states &#8220;report,&#8221; write a report, not a research paper. I don&#8217;t keep up with APA formatting except for the title page, in-text citation, and references page, so try not to use definitions like in a research paper. So far, your group is writing it as a report, not a research paper. \ud83d\ude42 It would be a great idea for your group to revisit the Project Overview and recapture the big picture of the end goal. The Project Overview also drops hints (Adversary Model, Cyber Kill Chain, and Defense in Depth) on approaching the project. The Project Overview states that &#8220;Your team has been informed by high-ranking officials that a foreign, government-based cyberattack group is suspected of hacking into computers that operate the U.S. Western Interconnection power grid to probe and map the network.&#8221; &#8220;Your company will work closely with the DoD and the North American Electric Reliability Corp to provide a plan that ensures the security and safety of the Western Interconnection power grid computer network. Keep this in mind when moving throughout the project. Overall, great job on the first part.<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Project Part 2: Identifying Cyber Threats and Applying the Cyber Kill Chain Scenario The DoD has requested a review of the vulnerabilities of the Western Interconnection power grid computer network, with strategies for reducing or eliminating the vulnerabilities. They also want a brief profile of the cyber attackers, using the Adversary Model as a foundation. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/27763"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=27763"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/27763\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=27763"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=27763"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=27763"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=27763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}