Expert answer:SEC435 Successful or Unsuccessful Hacking Attempt


Solved by verified expert:Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business or government facility. Lay out the details of the case, and provide your analysis of what was done and why, and speculate on what should have been done, or could have been done differently. As part of your analysis, you can speculate on what you might have done to change the outcome of your particular case. Draw specific lessons from the case and possible recommendations for future situations. Write a paper with no less than five pages in which you:
Research the web and identify a case study with an appropriate situation related to penetration testing or hacking for or against a business, organization, or government facility.
Lay out the case details, and provide your analysis of what was done and why, the results of the effort, the specific threats and vulnerabilities, and what mitigation was attempted or should have been attempted.
You may speculate on what actions you might have taken in a similar situation as part of your analysis.
Draw specific lessons and recommendations from your analysis of the case as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft.
Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.Note: The above are guidelines, they are not questions to be answered like an exam. Think through your paper so you have a clear idea of your lessons and takeaway, and outline your paper as you research, and before you begin writing. Review the outline and your writing and make adjustments as needed as new ideas are laid out, and assure your introduction, body, and conclusion work as one.
Your assignment must follow these formatting requirements:
Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.Click here to view the grading rubric for this case study

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Expert answer:SEC435 Successful or Unsuccessful Hacking Attempt
Just from $10/Page
Order Essay

It was on Monday, November 24, 2014, and the workers at Sony Pictures had just settled in at their
desks in Los Angeles. But as people started logging in to their computers, something very odd started
happening. Appearing on their screens was the bizarre image of a red-tinged, and evil-eyed looking skull,
with very bony fingers outstretched, with the words in big red letters on top “ Hacked by #GOP” and the
bottom in white said: Warning: We’ve already warned you, and this is just a beginning. We continue
until our request be met. We’ve obtained all your internal data including your secrets and top secrets. If
you don’t obey us, we’ll release data shown below to the world. Determine what will you do till
November the 24th, 11:00 PM (GMT). Below that was all the links to the data that they hacked and said
that they would show the world.
Somehow without knowing that they got hacked the Guardians of Peace (GOP) penetrated the entire
Sony studio’s computer systems. The GOP hacked in and stole thousands of emails and digital files of
five movies and four of them have not even be released yet they weren’t even in theaters yet.
Then before any of the studio’s information technology experts could do anything to try to shut it down
and stop it from infecting other computers systems the GOP released a second attack and this attack
spread like a major wildfire like there was in the mountains of California with the dry conditions.
The GOP released a software Worm as the second attack and that worm was leaping from one computer
system to the next and as it moved from one to another it was wiping out everything in its path. It was
erasing everybody’s information and everybody’s data and hard drives as well. Seconds later, it started
spreading to all the Sony Pictures offices like in Europe and Asia, wiping out and erasing all of their data
and hard drives too.
By the time the worm and finished the hackers GOP did not only steal valuable movie files and
thousands of embarrassing emails. The GOP also erased the hard drives of over half of the company’s
6,700 personal computers and nearly half of the 1,555 servers attached to its digital network.
The reason I chose this one is first I am close to Korea meaning having family there and this hack no one
knows until it was too late. Some say it was North Korea but with this hacker’s attack no one was ever
arrested for this hack.
I think that with all the technology out there and getting more advanced by the minute we should try to
come up with a code that would keep the hackers busy for hours, days, weeks and even months and
years as they would just keep spending their wheels with trying to hack and get nowhere and just give
up. The code should be like infinite security walls that never end. That might be a way to stop them for

Purchase answer to see full

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code ESSAYSHELP