0% found this document useful (0 votes)
91 views4 pages

Case Study Question.

Uploaded by

nimadoorji2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views4 pages

Case Study Question.

Uploaded by

nimadoorji2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Case Study Instructions: Ethical Hacking

Introduction

In the current digital age, cyber breaches are becoming more frequent and sophisticated, targeting
both large enterprises and small systems alike. This case study aims to immerse students in the
real-world application of ethical hacking by replicating or simulating cyber-attacks that have
recently occurred. By dissecting these breaches, students will gain practical insight into how
vulnerabilities are exploited and how such threats can be detected, mitigated, and reported. The
study is vital in preparing ethical hackers who not only understand the technical methods used by
attackers but also uphold the responsibility of protecting digital infrastructures.

Overview:
Each student is required to select a specific cyber breach case—preferably one that has occurred in
recent times—and conduct a detailed simulation of the attack using ethical hacking methodologies
and tools. The goal is to analyze how the breach took place, replicate or simulate it in a controlled
lab environment, and recommend appropriate defensive measures.

Topic Selection (Due Within 24 Hours)

Instructions:

1.​ Choose one unique topic (breach or hacking case).


2.​ Topics from previous semesters may be reused.
3.​ No duplicate topics allowed – use the shared Google Sheet to check existing selections.
4.​ Add your selected topic to the sheet within 24 hours of this announcement.

Google Sheet Link:


https://docs.google.com/spreadsheets/d/1KxF_-Dd5RvGG73pYO_rzaKyzwoFailt9fy1wYRGGgjg/edi
t?gid=1455568070#gid=1455568070
Note: If the original hack cannot be fully replicated due to environment limitations, a closely related
simulation is acceptable. You may also make reasonable assumptions to fill in gaps.

Case Study Structure Requirements:

1.​ Title Page


2.​ Abstract (150-200 words)
3.​ Introduction
4.​ Objectives of the Study
5.​ Tools and Environment Used
6.​ Methodology
7.​ Findings and Analysis
8.​ Risk and Impact Assessment
9.​ Mitigation and Recommendations
10.​Conclusion and Reflection on Ethics
11.​References (IEEE style)
12.​Appendices (if any)

Formatting Guidelines:

●​ Font: Times New Roman or Arial, Size 12


●​ Line spacing: 1.5
●​ Margins: 1 inch on all sides
●​ Use proper headings and subheadings​

Marking Scheme:

Written Report – 15 Marks

1.​ Introduction & Background (2 marks)


○​ Context and relevance to ethical hacking
○​ Background of the selected system or organization​

2.​ Threat Model & Methodology (3 marks)


○​ Identification of threats and vulnerabilities
○​ Description of ethical hacking approach and tools​

3.​ Technical Execution (4 marks)


○​ Practical execution using tools (e.g., Nmap, Burp Suite, Metasploit)
○​ Screenshots, command logs, and step-by-step explanations​

4.​ Risk Analysis & Mitigation (3 marks)


○​ Assessment of impact and likelihood
○​ Remediation strategies and recommendations​

5.​ Documentation Quality & Referencing (3 marks)


○​ Structure, language, and visuals
○​ IEEE citation style used correctly for all references​

Presentation – 10 Marks

1.​ Structure & Clarity (2 marks)


2.​ Technical Explanation (3 marks)
3.​ Visual Aids & Demonstration (2 marks)
4.​ Delivery & Engagement (2 marks)
5.​ Q&A Handling (1 mark)

Submission Format:

●​ File Format: PDF only


●​ File Naming Convention: <year4_enrollmentNo.pdf> (e.g., year4_12345678.pdf)
●​ Submission Method: Upload to submission link in VLE.

Deadline:

Submission Deadline: 19/05/2025


Note:

Plagiarism or use of unethical hacking practices will result in disqualification. Focus on


demonstrating your skills responsibly and ethically. Cite all external sources using IEEE format.

You must also have intext citation as well.

You might also like