Research Paper
Cyberattack Case Study
August 30, 2023
1 Cyberattack Case Study
In this assignment you'll write a short analysis of a significant cyberattack that:
• Occurred in the last 5 years
• Impacted more than one million accounts or had significant national or financial impact
• Exposed personally identifiable information (PII) or caused significant military,
infrastructure, political, or financial consequences/impact
1.1 Important report criteria
Make sure your paper addresses the following items about the cyberattack that you've selected.
• The history of its development
CIS3360-McAlpin
- Is this attack the first from the attack's creator?
- Were previous attacks successful?
- Was the attack sponsored by government entity, or a suspected government entity?
. The purpose of the attack
• Its intended usage domain, and the general characteristics of the attack's penetration
strategy
Research Paper/nDomains could include a specific industry, application, web platform, or piece of
infrastructure. (For example, consider internet access, wireless communications, or
cloud providers as infrastructure.)
• One distinctive feature or trait that set it apart from other attacks, either historically or
technologically
• Whether it or any of its descendants remain in use, and why do those descendants still
exist
1.1.1 Document requirements
Make sure the report is formatted as follows
• 12 point font
. 1 inch margins
• Line spacing set to 1.5
• minimum 3 pages of text
- More pages are allowed to provide for images
- There is still the three pages of text minimum
You need two references, one of which may be an online reference to the cyberattack and the
other of which should be a manual, textbook, or contemporary article describing it.
This is not a formal research paper but you must cite any source you use using the UCF APA
Guidelines and Tools, and you must write all material in your own terms, not merely copy and
paste.
1.1.2 Suggested Outline
Please make sure that your paper addresses all the items in the Report Criteria. It will help you
to organize your paper based on the outline suggested below.
1. Introduction
2. History of development
• Was the sponsor or creator a government agency or affiliate?
• What was the motivation? (Money, strategic, infrastructure, etc.) Be specific.
3. History of attack with discussion of the attack's impact on the chosen target(s)
4. General characteristics
CIS3360-McAlpin
Research Paper/n5. Usage domain(s) or target group(s)
6. Active descendants
7. What actions were taken to prevent similar attacks
8. What punitive actions were executed against the attacker(s)
Be sure to include at least one possible solution that would prevent this type of attack or similar
attacks.
1.2 APA Citation Resources
• Book Citation
BOOK
Print version:
General Form:
Last, F.M. (Date). Book tile (edition, if other than flest). Publisher
•Examples:
Parker, R. M., Jr. (2003). Bordeaser: A consumer's guide to the world's finest wines (4th rev. ed.).
Simon & Schuster.
O'Halloran, R. M. Jarvis, K., & Allen-Chabot, A. (Eds.). (2006). Cases in hospitality and tourism
management. Pearson Prentice Hall
• Magazine or Journal Citation
JOURNAL OR MAGAZINE ARTICLE
Print version:
• General Form:
Last, F. M. (Date). Article title. Journal Title, volume(umber), pages.
•Example:
Monteson, P. A., & Singer, J. (2004). Marketing a resort-based spa. Journal of Vacation
Marketing, 10(2) 282-288.
• Full UCF APA Citation Guidance
Rosen APA Guidelines
CIS3360-McAlpin
Research Paper/n1.3 Submission Instructions
Submit your assignment to WebCourses as a Microsoft Word, OpenOffice or PDF file.
1.4 Grading
The assignment shall be submitted via WebCourses. There should only be one file in the
submission. That file should be a PDF a WORD document, or an OpenOffice document.
Make sure that the page number is in the upper right corner.
CIS3360-McAlpin
Research Paper
Fig: 1
Fig: 2
Fig: 3
Fig: 4