Overall Theme
This assignment is about:
- Real-world data security attacks
- Understanding security terminology
- Analyzing vulnerabilities and threats
- Identifying impacts and consequences
- Evaluating mitigation strategies
It is a research-based analytical report, not a technical lab.
Length: 25003000 words
Individual work
APA references required
Main Task
You must:
Identify three recent data security attacks
Then for EACH attack, you must fully analyze it using security concepts learned in class.
What You Must Explain for Each Attack
For every attack, you must clearly describe:
- Type of attack
- Ransomware?
- Phishing?
- Data breach?
- DDoS?
- Insider attack?
- Assets impacted
- Customer data?
- Financial data?
- Intellectual property?
- Servers?
- Victim(s) and attackers target
- What company?
- What system was targeted?
- Timestamp
- When and where it happened
- Vulnerabilities
- Weak passwords?
- Unpatched software?
- Human error?
- Misconfiguration?
- Threats imposed
- Confidentiality breach?
- Integrity damage?
- Availability disruption?
- Security components compromised
- Authentication?
- Access control?
- Encryption?
- Network security?
- Consequences
- Financial loss
- Legal penalties
- Reputation damage
- Data leaks
- Mitigation or controls implemented
- Patch management
- Multi-factor authentication
- Firewalls
- Incident response plans
Required Report Structure
Your paper must include:
1? Introduction
Explain:
- Purpose of the assignment
- Why studying real attacks is important
- 35 key security concepts from the course
2? Background
Define important terminology:
- Asset
- Threat
- Vulnerability
- Target
- Breach
- Attack
- Risk
Explain why these terms matter in security analysis.
3? Methodology
Explain:
- How you found the attacks
- Why you chose those three
- What criteria you used
4? Description of Each Attack
Full detailed explanation using course terminology.
5? Analysis of Each Attack
Deep explanation:
- What was leaked?
- How did it happen?
- What weaknesses were exploited?
- What security principle failed? (CIA triad)
6? Conclusion
One strong paragraph summarizing:
- Lessons learned
- Recommendations
- Importance of security strategies
7? References
APA format
Proper citation required

Leave a Reply
You must be logged in to post a comment.