Quote from sachinm on 19 November 2023, 5:42 pm
Suggested Themes
- Limitations of System-Theoretic Accident Model and Processes (STAMP), Chain-of-Events Model, Fault Tree Analysis (FTA), STAMP (CAST).
- Risk assessment models Control Objectives for Information and Related Technology (COBIT), and ISO27001.
Suggested Case Studies
1.Colonial Pipeline Ransomware Attack (2021): Largest attack on US infrastructure and ransom payment of $4.4 million via Bitcoin.
2.SolarWinds cyberattack (2020): Hackers, directed by Russian spies, gained access to US agencies for 14 months through malware.
3.Kaseya supply chain ransomware attack (2021): Ripple effect was extremely widespread, impacting 60 Kaseya customers.
4.Ukraine power grid attack (2023): Sandworm Hackers Caused Another Blackout in Ukraine during a Missile Strike.
5.NotPetya malware attack (2017): Malware NotPetya spread from unassuming Ukrainian software firm to companies worldwide.
6.Aadhaar (2018): Infiltration of the world's largest ID database, Aadhaar, exposing information on more than 1.1 billion Indian citizens including names, addresses, photos, phone numbers, and emails, as well as biometric data like fingerprints and iris scans.
7.Alibaba (2022): Over an eight-month period, a developer working for an affiliate marketer scraped customer data, including usernames and mobile numbers totalling 1.1 billion pieces of user data.
Suggested Reading List
- Albert, R., Jeong, H. & Barabási, AL. “Error and attack tolerance of complex networks”. Nature 406, 378–382 (2000).
- Hamid Salim Stuart Madnick, Cyber Safety: A Systems Theory Approach to Managing Cyber Security Risks – Applied to TJX Cyber Attack CISL# 2016-09 August 2016
- UK Cyber Security Breaches Survey 2022
- UK National Cyber Strategy 2022
Suggested Themes
Suggested Case Studies
1.Colonial Pipeline Ransomware Attack (2021): Largest attack on US infrastructure and ransom payment of $4.4 million via Bitcoin.
2.SolarWinds cyberattack (2020): Hackers, directed by Russian spies, gained access to US agencies for 14 months through malware.
3.Kaseya supply chain ransomware attack (2021): Ripple effect was extremely widespread, impacting 60 Kaseya customers.
4.Ukraine power grid attack (2023): Sandworm Hackers Caused Another Blackout in Ukraine during a Missile Strike.
5.NotPetya malware attack (2017): Malware NotPetya spread from unassuming Ukrainian software firm to companies worldwide.
6.Aadhaar (2018): Infiltration of the world's largest ID database, Aadhaar, exposing information on more than 1.1 billion Indian citizens including names, addresses, photos, phone numbers, and emails, as well as biometric data like fingerprints and iris scans.
7.Alibaba (2022): Over an eight-month period, a developer working for an affiliate marketer scraped customer data, including usernames and mobile numbers totalling 1.1 billion pieces of user data.
Suggested Reading List
This website uses cookies to ensure you get the best experience on our website.