Professional Documents
Culture Documents
1.1.1.5 Lab - Cybersecurity Case Studies - ILM
1.1.1.5 Lab - Cybersecurity Case Studies - ILM
1.1.1.5 Lab - Cybersecurity Case Studies - ILM
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Research and analyze cyber security incidents
Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and experts
predict that these attacks are likely to increase in the future. Cybersecurity education is a top international
priority as high-profile cyber-security related incidents raise the fear that attacks could threaten the global
economy. The Center for Strategic and International Studies estimates that the cost of cybercrime to the
global economy is more than $400 billion annually and in the United State alone as many as 3000 companies
had their systems compromised in 2013. In this lab you will study four high profile cyberattacks and be
prepared to discuss the who, what, why and how of each attack.
Required Resources
PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 2 www.netacad.com
Lab – Cybersecurity Case Studies
through infected USB drives carried by vendors accessing the plants. Once infected, the worm recorded
computer monitor activity in order to display the captured data as real time stats and override the fault
detection system PLC’s to malfunction and result in damage to the centrifuges.
The answers will vary based on the cyberattack chosen.
c. When did the attack happen within the network?
The worm gained access to the facilities through infected USB drives carried by vendors accessing the
plants.
The answers will vary based on the cyberattack chosen.
d. What systems were targeted?
Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000
machines to physically degrade.
The answers will vary based on the cyberattack chosen.
e. What was the motivation of the attackers in this case? What did they hope to achieve?
The US and Israeli governments launched the attack to force the Iranian government to slow down their
production of weapon-grade uranium.
The answers will vary based on the cyberattack chosen.
f. What was the outcome of the attack? (stolen data, ransom, system damage, etc.)
The worm infected over 200,000 computers and caused 1,000 machines to physically degrade. Although
the government was the main target, the attack also resulted in the assassination of several Iranian
scientists as well as staff being blamed for the malfunctioning centrifuges and fired from the plants.
The answers will vary based on the cyberattack chosen.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 2 www.netacad.com