Project Plan
Name: Lajeen Alsagour
Project Title: Phishing On Social Media
|
Date started |
Time allowed |
Task/Activity |
Completed (date) |
|
8-4-2021 |
15 minutes |
I created a new blogger
account. |
8-4-2021 |
|
8-4-2021 |
2 hours and 30minutes |
I finished my first posts ( Welcome massage, introduction and
reflection on my current software skills. |
9-4-2021 |
|
20-4-2021 |
5 hour 30 minutes |
I worked on my project theme
which is about cyber threats, so I searched its riskiness. Also, I read a
book about 'The cyber threat landscape'. Moreover, I read another book titled
'How to Manage the Growing Risk of Cyber Attacks'. Therefore, with all those
sources I expanded my research and I talked in different aspects, such as on
the business side. |
20-4-2021 |
|
23-4-2021 |
3 hours |
I started working on my initial idea 1 on phishing, methods
to use phishing, phishing steps, phishing reasons and how to recognise a
phishing attack. My sources were online websites and an e-book from DMU
library titled Phishing: Cutting the Identity Theft Line. |
24-4-2021 |
|
24-4-2021 |
2 hours |
I created a post that talks
about my initial idea 2 on Malware, the way its works and how to protect your
device from Malware. Then I read an e-book titled Malware Detection,
Diplomica Verlag and I found useful information about Malware types |
24-4-2021 |
|
25-4-2021 |
3 hours |
I started gathering information about phishing by reading an
article titled 'Contributing factors to increased susceptibility to social
media phishing attacks', then I read about the history of phishing to assist
me to start writing the introduction. |
26-4-2021 |
|
26-4-2021 |
3 hour 30 minutes |
I collect some valuable
information from a book under the name 'security and privacy issues in social
networks'. Hence, that expanded my knowledge about phishing and I started
writing my main body. |
27-4-2021 |
|
28-4-2021 |
2 hours |
I search about my subject online, and I found some useful blogs
that provided me with essential data |
29-4-2021 |
|
30-4-2021 |
4 hours |
I read a
book online titled 'Weaponizing data science for social engineering' that gave me significant points to my main body |
30-4-2021 |
|
30-4-2021 |
4 hours |
I worked on my conclusion, then I adjusted my
essay draft, also I ensure the validity of my references and their
diversity. |
1-5-2021 |
|
30-4-2021 |
2 Hours |
I searched about the importance of computer
ethics, as well as doing further research about the chosen commandment |
1-5-2021 |
|
11-5-2021 |
3 Hours |
I started writing the initial questions for my questionnaire (project
theme questions + demographic questions) |
12 -5-2021 |
|
15-5-2021 |
1 Hour |
I created my survey by using (Google
Drive Forms) and I added the process of the creation on my blog |
15-5-2021 |
|
15-5-2021 |
2 Hours |
Once I completed my survey creation, I published it to my acquaintances |
15-5-2021 |
|
21-5-2021 |
1 Hour |
After receiving sufficient
responses to my survey (41 responses) I started analysing demographic
questions |
21—5-2021 |
|
23-5-2021 |
3 Hours |
I analysed the questions that are related to my project theme |
25-5-2021 |
|
24-5-2021 |
2 Hours and 30 minutes |
I looked at computer methodology (Malware
Analysis) and I did some research about it |
25-5-2021 |
|
25-5-2021 |
3 Hours |
I collected some information from web sources about malware spreading
process, then I made a diagram from that information |
25-5-2021 |
|
25-5-2021 |
2 Hours |
I searched about DDoS attack then I
made a diagram |
25-5-2021 |
|
26-5-2021 |
3 Hours |
I started gathering information from web sources to write the
background of my case study-introduction (Kevin Mitnick) |
27-5-2021 |
|
29-5-2021 |
4 Hours |
I looked at the Literature Review
of my case study, thus I added historical interpretation of (Kevin Mitnick),
as well as his achievements and his life. |
30-5-2021 |
|
31-5-2021 |
3 Hours |
I focused on the method of my case study. Therefore, I gave the
reasons of choosing (Kevin Mitnick), also I searched about his experiences and
his relationships with others in ‘Hacking’ |
31-5-2021 |
|
2-6-2021 |
2 Hours |
I summarised my case study and
published it as the conclusion of my case study |
2-6-2021 |
|
3-6-2021 |
5 Hours |
I searched and downloaded Bricata software and discovered it in depth.
Besides, I contacted with its developers to gain as much information as I can |
4 – 6-2021 |
|
4-6-2021 |
4 Hours |
I discovered Bricata platform and
analysed it |
4-6-2021 |
|
6-6-2021 |
3 Hours |
I summarised the academic paper titled ‘World of Cyber Security and Cybercrime’ |
6-6-2021 |
|
6-6-2021 |
3 Hours |
I collect some information about Man
In The Middle attack and created a diagram |
6-6-2021 |
|
6-6-2021 |
3 Hours and 30 minutes |
I have a depth search about Worm attack, then I post it in my blog as
initial idea 3 |
6-6-2021 |
|
8-6-2021 |
4 Hours |
I looked at the discussion part of my
case study and wrote the finding, identify my study's limitations, and suggested
further research by other authors |
8-6-2021 |
|
9-6-2021 |
3 Hours |
I managed to finish the software example by providing some data about how does the software work |
9-6-2021 |
|
9-6-2021 |
1 Hour |
I made the last adjustments to my
blog by checking each post |
9-6-2021 |
|
9-6-2021 |
1 Hour |
I reviewed the correctness of the references of my posts |
9-6-2021 |


0 Comments