Research a recent cyber-attack and using the Attack Case Study outlined in our text In Section 2.3.3 write a paper
A case study should include:
Overviewa paragraph that summarizes the attack, including what happened, when it happened, and the degree to which the attack succeeded.
Perpetratorbrief description of the threat agent who performed the attack. This does not need to be a complete profile. The attack scenarios details fill in many details about the agents resources and motivation.
Attack scenariodescription of the attack as it took place, using the scenario format. Omit the References section from the scenario; combine scenario references with the others at the end of this case study.
Risk managementdescription of how preattack risk management activities affected the attacks outcome. Identify these effects using the steps of the risk management framework (Section 1.1.2).