You are on page 1of 6

Project (Weight: 25%)

CMPS 385 Computer Security


Submission Due of the report: April 5, 2022

Spring 2022

Title: Yahoo! And WannaCry

Objectives of this Research Paper


This research provides you an opportunity to investigate for deeper knowledge and analysis
about two major cyber attacks that took place in real world. These two cases help you to
understand and develop your research skills in the area of computer security. The deliverable
of this research is an academic research article. The learning objectives of this research are:

1. Demonstrate advanced written communication and presentation skills.


2. Develop advanced level of analytical skills and critical thinking
3. Demonstrate skill in literature survey
4. Develop advanced knowledge in the area of real information security incidents.

Background
You need to study thoroughly the following two cyber incidents that took place a few years ago:

a) Yahoo! Attack: Hackers first gained access to Yahoo! user account in 2013, but
Yahoo! discovered a breach in late 2014, and it publicly disclosed the 2014 breach in
September 2016.

b) WannaCry: In 2017, the hackers infected thousands of systems with WannaCry


ransomware across the globe.
Your Tasks

Write a comprehensive research article/paper on the above two cyber attacks. You need to
search for relevant papers and reports on these two in order to get details. This research is
based on three major aspects:

A. Information gathering: Understanding the attack, consequences (impact), and


actions with factual information. You need to do comprehensive literature review in
order to get details information.
B. Analysis: Analyze the above factual information in the lens of a security expert. This
is your own analysis based on the information gathered. You may also provide deeper
analysis on which ways these two attacks are different and in which ways they are
similar. What went wrong, which countermeasure(s) could have prevented these
attacks, etc.
C. Lesson learned: Provide your own recommendations to other similar organizations
about the similar attacks in the future.

For each case, you must first Identify the details of the breach, what went wrong, which
assets were attacked, and how, what was the outcome of the attack, who were the threat
actors, impact of the attacks, etc.:
• The details of the breach, what went wrong, which assets were attacked, and how,
what was the outcome of the attack, who were the threat actors, impact of the attacks,
etc.:
• Technical aspect of the attack (how the attacker did it, what techniques were used by
the attacker),

Page 1 of 6
• The impacts of the attack or the consequences after the attack
• The immediate actions or reactions of the organization
• The response strategies of the organization took (immediate and long term) before
and after the attack.
• What steps the organization took after the attack such as mitigating process
employed, any proactive defense that the organization took
• Any other protection approaches that the organization employed before or after the
attack.
• Provide a comparison table showing the differences and/or similarities between these
two attacks.
• Make some recommendations on how organizations in Qatar can avoid such attacks.

Your research will be evaluated based on accuracy, justification, clarity,


comprehensiveness, and analysis.

Grade Distribution
Criteria Grading %
Comprehensiveness and correctness of fact and information 20
Critical literature/newspaper article review 10
Analysis of the fact and situation 30
Comparison and recommendations 20
Written presentation of the paper (Language, structure of the paper, use of figures, 20
tables, etc.)
Total 100

Grading rubrics
Grade Rubrics
Excellent research paper with logical flow of sections, very thorough logical and deeper
90 -100% analysis, detail factual information, a good number of papers used, useful recommendations,
outstanding presentation. Fully achieved the four learning objectives. The paper is probably
publishable after a minor revision.
80 - 89% Very good research paper but with some weak logical explanation or justification, analysis is
not quite complete, the factual information could include some more information. Sometimes
the explanation/artifacts may not be clear. Not fully achieved the four learning objectives. The
paper is publishable but with a major revision.
70 - 79% Good but with several weak analysis and justifications. The explanation/artifacts may not be
very logical and/or realistic. Some aspects of analysis or recommendation may be partially
missing. Partially achieved the four learning objectives. The paper is not publishable
0 - 69% Not satisfactory with a lack of logical explanations. Did not include many papers as reference,
many facts are missing, presentation is not good.

Preparation of your paper

Your article must be at least 8 pages. Structure your articles into several sections and sub sections such
as: Title, Abstract, Introduction or motivation, Attack, Impact, Analysis, Discussion, Recommendation,
Conclusion, etc. These are just suggestions, you can use other structure. Provide tables and diagrams if
needed.

In order to do this research, you have to read some research papers/articles on this topic. Several
relevant articles are available from the Internet, especially from IEEE, ACM Digital libraries. QU
library has a good electronic source of articles. For IEEE visit (http://library.qu.edu.qa/#I), and for
ACM see (http://library.qu.edu.qa/#A). You must refer at least 10 articles in your paper.

You must use the IEEE Computer Society press conference template attached in APPENDIX-A. Use
single column format.

Page 2 of 6
Submission requirements
Your assignment group/team MUST comply with the following submission requirements:

1. Your group should have minimum three/four members.


2. Make sure that each group submits only one hardcopy to me, and each group
member must submit the electronic version on Blackboard individually.
3. The hardcopy and the electronic copy must be consistent to each other.
4. Your article MUST not have more than 25% similarity match with other sources.

5. Be aware of
• Submitted work must be students’ own work
• You cannot copy the project from other groups or from old reports done by other
students
• Other electronics or paper sources.
• You MUST NOT copy or use any materials from other sources without due
acknowledgement.
• All texts in the figures must be clearly and easily readable, otherwise 0 grade will
be assigned for unreadable and unclear texts.

Page 3 of 6
APPENDIX-A

IEEE Computer Society Template

Paper Title* (use style: paper title)


Subtitle as needed (paper subtitle)

Your Name
line 1 (of Affiliation): dept. name of organization
line 2-e-mail address if desired

Abstract—This electronic document is a “live” template and already defines the components of your
paper [title, text, heads, etc.] in its style sheet. *CRITICAL: Do Not Use Symbols, Special Characters, or
Math in Paper Title or Abstract. (Abstract maximum 300 chracters)

Keywords—component; formatting; style; styling; insert (key words)

Introduction (Heading 1)
This template, modified in MS Word 2007 and saved as a “Word 97-2003 Document” for the PC,
provides authors with most of the formatting specifications needed for preparing electronic versions of
their papers. All standard paper components have been specified for three reasons: (1) ease of use when
formatting individual papers, (2) automatic compliance to electronic requirements that facilitate the
concurrent or later production of electronic products, and (3) conformity of style throughout a
conference proceedings. Margins, column widths, line spacing, and type styles are built-in; examples of
the type styles are provided throughout this document and are identified in italic type, within
parentheses, following the example. Some components, such as multi-leveled equations, graphics, and
tables are not prescribed, although the various table text styles are provided. The formatter will need to
create these components, incorporating the applicable criteria that follow.

Some Common Mistakes


• The word “data” is plural, not singular.
• The subscript for the permeability of vacuum µ0, and other common scientific constants, is zero
with subscript formatting, not a lowercase letter “o.”
• In American English, commas, semi-/colons, periods, question and exclamation marks are
located within quotation marks only when a complete thought or name is cited, such as a title or
full quotation. When quotation marks are used, instead of a bold or italic typeface, to highlight a
word or phrase, punctuation should appear outside of the quotation marks. A parenthetical phrase
or statement at the end of a sentence is punctuated outside of the closing parenthesis (like this).
(A parenthetical sentence is punctuated within the parentheses.)
• A graph within a graph is an “inset,” not an “insert.” The word alternatively is preferred to the
word “alternately” (unless you really mean something that alternates).
• Do not use the word “essentially” to mean “approximately” or “effectively.”
• In your paper title, if the words “that uses” can accurately replace the word using, capitalize the
“u”; if not, keep using lower-cased.
• Be aware of the different meanings of the homophones “affect” and “effect,” “complement” and
“compliment,” “discreet” and “discrete,” “principal” and “principle.”
• Do not confuse “imply” and “infer.”
• The prefix “non” is not a word; it should be joined to the word it modifies, usually without a
hyphen.
• There is no period after the “et” in the Latin abbreviation “et al.”
• The abbreviation “i.e.” means “that is,” and the abbreviation “e.g.” means “for example.”

Page 4 of 6
An excellent style manual for science writers is [7].

Identify the Headings


Headings, or heads, are organizational devices that guide the reader through your paper. There are
two types: component heads and text heads.
Component heads identify the different components of your paper and are not topically subordinate
to each other. Examples include ACKNOWLEDGMENTS and REFERENCES, and for these, the
correct style to use is “Heading 5.” Use “figure caption” for your Figure captions, and “table head” for
your table title. Run-in heads, such as “Abstract,” will require you to apply a style (in this case, italic) in
addition to the style provided by the drop down menu to differentiate the head from the text.
Text heads organize the topics on a relational, hierarchical basis. For example, the paper title is the
primary text head because all subsequent material relates and elaborates on this one topic. If there are
two or more sub-topics, the next level head (uppercase Roman numerals) should be used and,
conversely, if there are not at least two sub-topics, then no subheads should be introduced. Styles named
“Heading 1,” “Heading 2,” “Heading 3,” and “Heading 4” are prescribed.

Figures and Tables


Positioning Figures and Tables: Place figures and tables at the top and bottom of columns. Avoid
placing them in the middle of columns. Large figures and tables may span across both columns. Figure
captions should be below the figures; table heads should appear above the tables. Insert figures and
tables after they are cited in the text. Use the abbreviation “Fig. 1,” even at the beginning of a sentence.

TABLE I. TABLE STYLES

Table Table Column Head


Head Table column subhead Subhead Subhead
copy More table copya

Fig. 1. Example of a figure caption. (figure caption)

Figure Labels: Use 8 point Times New Roman for Figure labels. Use words rather than symbols or
abbreviations when writing Figure axis labels to avoid confusing the reader. As an example, write the
quantity “Magnetization,” or “Magnetization, M,” not just “M.” If including units in the label, present
them within parentheses. Do not label axes only with units. In the example, write “Magnetization (A/m)”
or “Magnetization (A ( m(1),” not just “A/m.” Do not label axes with a ratio of quantities and units. For
example, write “Temperature (K),” not “Temperature/K.”

References
The template will number citations consecutively within brackets [1]. The sentence punctuation
follows the bracket [2]. Refer simply to the reference number, as in [3]—do not use “Ref. [3]” or
“reference [3]” except at the beginning of a sentence: “Reference [3] was the first ...”
Number footnotes separately in superscripts. Place the actual footnote at the bottom of the column in
which it was cited. Do not put footnotes in the reference list. Use letters for table footnotes.
Unless there are six authors or more give all authors’ names; do not use “et al.”. Papers that have not
been published, even if they have been submitted for publication, should be cited as “unpublished” [4].
Papers that have been accepted for publication should be cited as “in press” [5]. Capitalize only the first
word in a paper title, except for proper nouns and element symbols.

Page 5 of 6
References example

[1] G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of
Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references)
[2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-
73.
[3] I.S. Jacobs and C.P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G.T.
Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271-350

Page 6 of 6

You might also like