Project Plan

 Name: Lajeen Alsagour

Project Title:  Phishing On Social Media 



Date started

Time allowed

Task/Activity

Completed

(date)

 8-4-2021

 15 minutes

 I created a new blogger account.

 

 

 8-4-2021

8-4-2021 

 2 hours          and  30minutes

 I finished my first posts ( Welcome massage, introduction and reflection on my current software skills. 

 

 

 9-4-2021

 20-4-2021

5 hour

30 minutes 

 I worked on my project theme which is about cyber threats, so I searched its riskiness. Also, I read a book about 'The cyber threat landscape'. Moreover, I read another book titled 'How to Manage the Growing Risk of Cyber Attacks'. Therefore, with all those sources I expanded my research and I talked in different aspects, such as on the business side.

 20-4-2021

 23-4-2021

 3 hours

 I started working on my initial idea 1 on phishing, methods to use phishing, phishing steps, phishing reasons and how to recognise a phishing attack. My sources were online websites and an e-book from DMU library titled Phishing: Cutting the Identity Theft Line.

 24-4-2021

 24-4-2021

 2 hours

 I created a post that talks about my initial idea 2 on Malware, the way its works and how to protect your device from Malware. Then I read an e-book titled Malware Detection, Diplomica Verlag and I found useful information about Malware types 

 

 

 24-4-2021

 25-4-2021

 3 hours

 I started gathering information about phishing by reading an article titled 'Contributing factors to increased susceptibility to social media phishing attacks', then I read about the history of phishing to assist me to start writing the introduction.

 26-4-2021

26-4-2021

3 hour

30 minutes

 I collect some valuable information from a book under the name 'security and privacy issues in social networks'. Hence, that expanded my knowledge about phishing and I started writing my main body.

 

 

 27-4-2021

 28-4-2021

2 hours

 I search about my subject online, and I found some useful blogs that provided me with essential data

 

 

 29-4-2021

30-4-2021

 4 hours

 I read a book  online titled 'Weaponizing data science for social engineering'   that gave me significant points to my main body

 

 

 30-4-2021

30-4-2021

 

 4 hours

 

 

 I worked on my conclusion, then I adjusted my essay draft, also I ensure the validity of my references and their diversity.

 1-5-2021

30-4-2021

2 Hours

I searched about the importance of computer ethics, as well as doing further research about the chosen commandment

1-5-2021

11-5-2021

3 Hours

I started writing the initial questions for my questionnaire (project theme questions + demographic questions)

12 -5-2021

15-5-2021

1 Hour

I created my survey by using (Google Drive Forms) and I added the process of the creation on my blog

15-5-2021

15-5-2021

2 Hours

Once I completed my survey creation, I published it to my acquaintances

15-5-2021

21-5-2021

1 Hour

After receiving sufficient responses to my survey (41 responses) I started analysing demographic questions 

21—5-2021

23-5-2021

3 Hours

I analysed the questions that are related to my project theme

25-5-2021

24-5-2021

2 Hours and 30 minutes

I looked at computer methodology (Malware Analysis) and I did some research about it

25-5-2021

25-5-2021

3 Hours

I collected some information from web sources about malware spreading process, then I made a diagram from that information

25-5-2021

25-5-2021

2 Hours

I searched about DDoS attack then I made a diagram

25-5-2021

26-5-2021

3 Hours

I started gathering information from web sources to write the background of my case study-introduction (Kevin Mitnick)

27-5-2021

29-5-2021

4 Hours

I looked at the Literature Review of my case study, thus I added historical interpretation of (Kevin Mitnick), as well as his achievements and his life.

30-5-2021

31-5-2021

3 Hours

I focused on the method of my case study. Therefore, I gave the reasons of choosing (Kevin Mitnick), also I searched about his experiences and his relationships with others in ‘Hacking’

31-5-2021

2-6-2021

2 Hours

I summarised my case study and published it as the conclusion of my case study

2-6-2021

3-6-2021

5 Hours

I searched and downloaded Bricata software and discovered it in depth. Besides, I contacted with its developers to gain as much information as I can

4 – 6-2021

4-6-2021

4 Hours

I discovered Bricata platform and analysed it

4-6-2021

6-6-2021

3 Hours

I summarised the academic paper titled ‘World of Cyber Security and Cybercrime’

6-6-2021

6-6-2021

3 Hours

I collect some information about Man In The Middle attack and created a diagram

6-6-2021

6-6-2021

3 Hours and 30 minutes

I have a depth search about Worm attack, then I post it in my blog as initial idea 3

6-6-2021

8-6-2021

4 Hours

I looked at the discussion part of my case study and wrote the finding, identify my study's limitations, and suggested further research by other authors

8-6-2021

9-6-2021

3 Hours

I managed to finish the software example by providing some data about how does the software work

9-6-2021

9-6-2021

1 Hour

I made the last adjustments to my blog by checking each post

9-6-2021

9-6-2021

1 Hour

I reviewed the correctness of the references of my posts

9-6-2021


0 Comments