Need Help With Homework


Cyberwarfare History (2–4 pages)


You are a cybersecurity analyst that is part of the security team at Red Cell 637 Defense, a DoD contractor specializing in cyber operations and defensive strategies.


High-ranking federal government officials inform your team that recent intelligence shows an advanced persistent threat (APT) is performing active reconnaissance and is currently in the weaponize phase of the Cyber Kill Chain. The APT is believed to be looking at exploiting vulnerabilities against the computers that operate the Western Interconnection power grid. You are to assume that this APT originates from either a well-funded nation state or terrorist group. The APT has been able to probe and map the network over the course of several months during their reconnaissance phase. The officials have given your team access to classified intelligence indicating that the currently unidentified group is planning to install malicious

malware within the grid’s computer network that will disrupt power to eleven states.


Your team has been asked to work closely with the DoD, Department of Homeland Security (DHS), and other federal stakeholders to strengthen the security and safety of the power grid and its related computer information systems.

The DoD has requested a review of cyberwarfare history related to critical infrastructures and power generation. As part of this report, you will determine who the likely cyberattacker is and create a complete profile of the tactics, techniques, and procedures (TTP), cyber-related capabilities and motivation, as well as the physical and logical access of this cyberattacker.


Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources,

even if cited correctly. Use the Turnitin Originality Report available in Taskstream as a guide for this measure of originality.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.


A.  Evaluate the evolution of cyber-related capabilities and technologies in warfare since 1998. Be sure to reference academic or scholarly research to support your findings.


B.  Explain the characteristics of an APT, including specific examples of the tradecraft commonly used by an APT to accomplish its intended goals.


C.  Explain how the characteristics of the APT in the scenario are different than the threats or attacks that would

have been attempted before 1998, before widespread access to the Internet.


D.  Describe where on the network an attack could originate. Provide specific examples based on general critical infrastructure systems (CIS) vulnerabilities to justify your claims.


E.  Create a profile of an attacker who could execute an attack on the Western Interconnection power grid. Your profile should include research-based information about the attacker’s probable resources, capabilities, and physical and logical access.


F.  Acknowledge sources, using APA-formatted in-text citations and references, for content that is quoted, paraphrased, or summarized.


Question Field

Asked by james18
5 years ago
1455 Rank 281 Views
1111 Rank 1227 Views
100 Rank 1173 Views
 Week 4 Case Study

Asked by santoskatherine 5 years ago

355 Rank 160 Views
 All In The Docs

Asked by colleen20 5 years ago

492 Rank 509 Views
 Help With Assignment

Asked by fordsherry 5 years ago