Advanced Ethical Hacking
Cyber Attack Case Study
Outcome 1: Provide students with knowledge and understanding of the various hacking methods used in attacking computer systems and networks
Outcome 2: Enable students to use appropriate tools and techniques to identify, analyse, evaluate and test computer security vulnerabilities prone to hacking attacks, and develop appropriate procedures, solutions and countermeasures to defend and minimise such attacks.
Outcome 3: To develop students' awareness of ethical, professional and legal issues connected with hacking.
Assessment task details - provide a description of the task he WannaCry Ransomware attack was an impactful cyber-attack that had worldwide effect and repercussions. This attack spread through computers running Microsoft operating systems, encrypting the data, and demanding a bitcoin ransom for the decryption key.
This attack has been a prevalent driving force behind much of the changing public perception of Cyber Security and gave raise to many policy changes both within governmental and organisational approach to cyber security
In this assignment you are tasked with investigating the response and wider social impacts of the WannaCry attack. You should consider the following elements:
Introduction
Introduction to topic, brief background of the attack carried out and an overview of its impacts.
Attack Prevention
Discuss the methods or steps that could/should have been taken to prevent vulnerability to this attack or reduce its impact
Incident Response and Disaster Recovery
Based on your research of incident response and disaster recovery methodologies; what steps should organisations that were affected have taken and critically analyse differing approaches.
Legal and ethical considerations
Discuss the legal and ethical considerations that an organisation would need to consider when faced with an attack of this nature.
You may also wish to consider any wider social impact of this attack.
Conclusions
Summarise your finding within this case study and make high level recommendations for how an organisation could protect themselves from becoming a victim of an attack of this nature.
Attachment:- Advanced Ethical Hacking.rar