Vulnerability Case Study For the project, 15 minute presentation, a Powerpoint presentation (< 15 slides), and an annotated bibliography of the sources upon which you rely. THE VULNER
Vulnerability Case Study
For the project, 15 minute presentation, a Powerpoint presentation (< 15 slides), and an annotated bibliography of the sources upon which you rely.
THE VULNERABILITY YOU HAVE TO WORK ON IS
https://nvd.nist.gov/vuln/detail/CVE-2023-20198
Subject Matter:
Your task is to research a known exploit of a vulnerability from within the past 3 years.
- A high-level description of the vulnerability
- A more detailed discussion of the vulnerability. You should start by looking up the CVE in the National Vulnerability Database and use that as a way to find additional references.
- Analyze what STRIDE aspects apply to the vulnerability
- Analyze what aspects of the CIA triad were impacted
- How the vulnerability was discovered and disclosed
- How it was exploited and the impact
- How it was resolved
Research Process:
Your research should be done in a few separate phases:
1. Start with a general search to find an interesting case for analysis. You can Google for news stories, look at Google Project Zero, security focused blogs, newsletters, or YouTube channels, and similar sources to find a high-level discussion.
2. Find the CVE in the National Vulnerability Database. This will be a key step in getting sufficient technical details about the vulnerability and will lead you to additional resources.
3. Look for third party analysis, discussion of exploits, responses from the product owner, patches, and other related information pertaining to the vulnerability. Again, the CVE will be a good resource for this part.
As you find relevant sources that you will use, add it to the bibliography with a brief annotation. The annotation should provide a high-level summary of the source and why the purpose for which you are using the source. It could be helpful to highlight key quotes and/or excerpts as well.
Presentation and Slides:
Once you have done your research and conducted your analysis, the next step is to prepare the presentation. Prepare a Powerpoint presentation (should be around 12 to 15 slides). Slides should be organized. Slides should provide short bullet points — do not write paragraphs on the slide and read off of them. Relevant visuals and graphics that enhance the discussion are always welcome.
PLEASE YOU HAVE TO INCLUDE EVERYTHING WHICH I HAVE MENTION ABOVE ,
As you find relevant sources that you will use, add it to the bibliography with a brief annotation. The annotation should provide a high-level summary of the source and why the purpose for which you are using the source. It could be helpful to highlight key quotes and/or excerpts as well. IT HAS TO BE IN A DIFFERENT FILE
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.