- Find a recent cybersecurity incident. A good resource for this may be the FBI, CERT, CISA, SANS, Verizon Data Breach reports and etc.
- Write an attack case study about the incident. Make sure to include all five steps listed in the text (Overview, Perpetrator, Attack Scenario, Risk Management, and References)
- Paper Requirements:
- Format: Microsoft Word
- Font: Arial, 12-Point, Double-Space (or equivalent)
- Citation Style: APA or MLA (The point is to use a style that makes your document readable and give credit to the sources you used.)
Length Requirements:
- 2–3 pages
- Coversheet
- List of References Page.
- Proofread – Edit for spelling, grammar, punctuation, etc.
- Use only course text, professional journal articles, or other reputable resources.