Cyberwarfare History Dissertation Essay Help

Introduction:

Using the scenarios provided in each task, compose each of the three components of a cyberwarfare defense report. The defense report in its entirety should be written for the Department of
Defense (DoD) Chief Information Officer (CIO). The defense report has been broken into three tasks, each task should be submitted independently for scoring. Your report should be formatted in Arial
12-point font and double spaced. For this task, you will write the cyberwarfare portion of the defense report, which should be 2–4 pages long.

Task 1: Cyberwarfare History (2–4 pages)
Task 2: Network Evaluation and Defense in Depth Strategy (6–9 pages)
Task 3: Mission Assurance (1–2 pages)

Scenario:

You are a cybersecurity analyst that is part of the security team at Red Cell 637 Defense, a DoD contractor specializing in cyber operations and defensive strategies.

High-ranking federal government officials inform your team that recent intelligence shows an advanced persistent threat (APT) is performing active reconnaissance and is currently in the weaponize
phase of the Cyber Kill Chain. The APT is believed to be looking at exploiting vulnerabilities against the computers that operate the Western Interconnection power grid. You are to assume that this
APT originates from either a well-funded nation state or terrorist group. The APT has been able to probe and map the network over the course of several months during their reconnaissance phase. The
officials have given your team access to classified intelligence indicating that the currently unidentified group is planning to install malicious malware within the grid’s computer network that
will disrupt power to eleven states.

Your team has been asked to work closely with the DoD, Department of Homeland Security (DHS), and other federal stakeholders to strengthen the security and safety of the power grid and its related
computer information systems.

The DoD has requested a review of cyberwarfare history related to critical infrastructures and power generation. As part of this report, you will determine who the likely cyberattacker is and
create a complete profile of the tactics, techniques, and procedures (TTP), cyber-related capabilities and motivation, as well as the physical and logical access of this cyberattacker.

Requirements:
A. Evaluate the evolution of cyber-related capabilities and technologies in warfare since 1998. Be sure to reference academic or scholarly research to support your findings.

B. Explain the characteristics of an APT, including specific examples of the tradecraft commonly used by an APT to accomplish its intended goals.

C. Explain how the characteristics of the APT in the scenario are different than the threats or attacks that would have been attempted before 1998, before widespread access to the Internet.

D. Describe where on the network an attack could originate. Provide specific examples based on general critical infrastructure systems (CIS) vulnerabilities to justify your claims.

E. Create a profile of an attacker who could execute an attack on the Western Interconnection power grid. Your profile should include research-based information about the attacker’s probable
resources, capabilities, and physical and logical access.

F. Acknowledge sources, using APA-formatted in-text citations and references, for content that is quoted, paraphrased, or summarized.

Need help with this Essay/Dissertation?
Get in touch Essay & Dissertation Writing services

Cyberwarfare
Write My Academic Essay

Is this question part of your assignment?

Place order