You are on page 1of 7

Build an attack case study report using this template.

If you
need help, refer to the instructional video.

There are five content slides plus a title slide in this


template. You can receive up to 20 points for each content
slide. You need 80 points to pass this assignment.

For your best chance of success, pick an attack or breach


with enough information and data so that you will be able to
Instructions report the required information.

Replace the red text on each slide with your information and
change the text color to black or white, depending on the
background. You can change the font size, if needed.

When your report is complete, delete this slide and save


your file as a PDF to submit for review.
Case Study

Attack Category

Company/Affected parties

© Copyright IBM Corp. 2023


Examples: ransomware, vishing, spear phishing, injection, etc.

1. Provide a description of the Attack Category to teach the


reviewer about the attack.

2. Provide a statistic about this type of the attack, or about attacks


to this company’s industry.

Possible sources for your research:


Attack Category:
Name of category Internet sources, Wikipedia, etc
X-Force Threat Intelligence Index 2023
Blogs
Journals, reports

Cite your sources.


Provide a company description and breach summary.

Company
Description and
Breach Summary
Event 1
1 Provide 6 chronological events or milestones related to this attack. This can
include related events before and after the attack.

Event 2
2

Event 3
3

Timeline
Event 4
4

Event 5
5

Event 6
6
Vulnerabilities
In this box, provide an overall vulnerability summary.
Then provide a summary of 4 specific vulnerabilities for your case in the boxes below.

Vulnerability 1 Vulnerability 2 Vulnerability 3 Vulnerability 4


Summary Summary Summary Summary
Costs Prevention

• 1 • 1

• 2 • 2

• 3 • 3

• etc. • etc.
Costs and
Prevention

You might also like