Vulnerability Case Study
For the project, 15 minute presentation, a Powerpoint presentation (< 15 slides), and an annotated bibliography of the sources upon which you rely.
THE VULNERABILITY YOU HAVE TO WORK ON IS
https://nvd.nist.gov/vuln/detail/CVE-2023-20198
Subject Matter:
Your task is to research a known exploit of a vulnerability from within the past 3 years.
Research Process:
Your research should be done in a few separate phases:
1. Start with a general search to find an interesting case for analysis. You can Google for news stories, look at Google Project Zero, security focused blogs, newsletters, or YouTube channels, and similar sources to find a high-level discussion.
2. Find the CVE in the National Vulnerability Database. This will be a key step in getting sufficient technical details about the vulnerability and will lead you to additional resources.
3. Look for third party analysis, discussion of exploits, responses from the product owner, patches, and other related information pertaining to the vulnerability. Again, the CVE will be a good resource for this part.
As you find relevant sources that you will use, add it to the bibliography with a brief annotation. The annotation should provide a high-level summary of the source and why the purpose for which you are using the source. It could be helpful to highlight key quotes and/or excerpts as well.
Presentation and Slides:
Once you have done your research and conducted your analysis, the next step is to prepare the presentation. Prepare a Powerpoint presentation (should be around 12 to 15 slides). Slides should be organized. Slides should provide short bullet points — do not write paragraphs on the slide and read off of them. Relevant visuals and graphics that enhance the discussion are always welcome.
PLEASE YOU HAVE TO INCLUDE EVERYTHING WHICH I HAVE MENTION ABOVE ,
As you find relevant sources that you will use, add it to the bibliography with a brief annotation. The annotation should provide a high-level summary of the source and why the purpose for which you are using the source. It could be helpful to highlight key quotes and/or excerpts as well. IT HAS TO BE IN A DIFFERENT FILE