What sort of people would go after the given information

Assignment Help Computer Engineering
Reference no: EM131445149

Assignment: Hacker Culture and Mitigation

Course Objective: Examine hacker culture and related psychological and cultural aspects of cybersecurity from both the malicious actor and user's perspectives.

Competencies: Critical thinking, communication skills

Each student may choose one of the following organizations (e.g., a private company or a government agency), attack, or perpetrator and should identify a significant past incident in cybercrime or cyberwarfare related to it. The student will fully discuss the specifics of the cyber incident and analyze the motivation of the threat actors/attackers. Analyze the possible motivations of those who worked to defend assets against disruption, and describe motivations of any possible third-parties that may also have been involved. The student will also suggest methods for the organization to discourage hackers or intruders with similar motives and suggest management, policy or technology controls to protect the organization against similar attacks.

Organizations, Attacks, and Perpetrators:
Home Depot

Target

Sony

Office of Personnel Management

Saudi Aramco

Turbo Tax

NASA

Operation Aurora

US Bureau of Justice Statistics

Stuxnet and Flame (US Government?)

Dupont Chemical

Boeing

Johnson & Johnson
Pfizer

4Chan

Tricare Medical

Opi Israel

Sony

News of the World

Motorola

Omega Engineering

Syrian Electronic Army

Njrat

The Jester

Blue Army

Project Chanology

The Estonian Cyberwar

Shamoon (Iran?)

Your paper should describe the type of incident and the actors: personalities, motivations, and other contributing cultural or psychological characteristics. You will find Module "Psychological Aspects of Cybersecurity" helpful with this assignment. Link your analysis to previous readings, interactive modules, and discussion topics, with appropriate citations.

At a minimum, the questions you must address are listed below:

a. What descriptive labels might apply to this type of threat/incident?

b. Regarding the threat actors:

What sort of people would go after this information?

Why would they want it?

What will/can they do with it?

How would they get it?

How would potential attackers be identified?

c. How would the organization try to discourage, or reduce the incentives that could attract possible threat actors?

d. How would the organization protect against, or reduce damaging effects due to attempted attacks?

Length 5-7 pages, due at the end of Week 8.

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.

Reference no: EM131445149

Questions Cloud

What does just-in-time inventory management : What does Just-in-time inventory management have to do with the Carle Heart Center in Urbana, Illinois? The Carle Heart Center is one of the most sophisticated cardiac care facilities in the Midwest.
Write an overview of what the article was about : Has the Internet contributed to plagiarism? Write an overview of what the article was about, what did you like about it, what didn't you like, what did you find interesting, etc.
Will solutions and interventions come from your study : Students are required to submit a research paper that covers one social issue. You are free to choose from the following general areas: poverty/unemployment; juvenile offender rehabilitation; racial discrimination; transgender discrimination; gen..
Define e-activity : From the first e-Activity, examine the best practices found in the video on inventory management. (first e-Activity ) Watch the video, titled "Inventory Management Best Practices for 2012," Be prepared to discuss.
What sort of people would go after the given information : What sort of people would go after this information? Why would they want it? What will/can they do with it? How would they get it? How would potential attackers be identified?
Calculate the ionization constant of hy : A 0.10 M solution of NaY has a pH of 11.50. Calculate the ionization constant of HY. Calculate the pH of a 0.32M NH4Cl solution. K for NH3= 1.8E-5
Itil specify the risk(s) the standard addresses : Standard: ITIL specify the risk(s) the standard addresses. Then, identify an organization in which the risk of non-compliance with this standard is high, and an organization in which the risk of non-compliance is low.
Determine the minimum molecular mass of the protein : A certain protein was found to contain 0.471% zinc by mass. Determine the minimum molecular mass of the protein.
Write you synthesis the stages described in the given video : Write you synthesis following the stages described in the video - conception and planning to building, testing, implementing, and evaluating the finished product, looking at the personnel, tools, and methodologies used along the way.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Assume that we are using the given checksum scheme add up

a. suppose computers a b c and d are connected to an ethernet cable similar to the setup shown in lecture. computer a

  Write r functions for forecasting future values

you will write R functions for forecasting future values of a time series, and apply them to observations on numbers of deaths and maximum temperatures in Houston, Texas.

  What mean to take a systems view of a project

What does it mean to take a systems view of a project? How does taking the systems view of a project apply to project management.

  What are some advantages and disadvantages of using

1. before designing a network one must understand what?2. technical goals in a top down network design consists of

  Why text in txtboxin is moved to txtboxout

You have a form with two text boxes, txtBoxIn and txtBoxOut, and a command button, cmdButton1. Write down the instructions such that when the button is selected, the text in txtBoxIn is moved to txtBoxOut.

  Use of mobile devices and the growth of the internet

Students are required to write an academic report as per the format outlined in chapter 5 of the textbook. The report must follow Harvard citation and referencing guidelines.

  Design model below to complete

Use the KCT design model below to complete this case.CUSTOMER(CustomerID, FirstName, LastName, Street, City, State, Zip, Phone)RENTAL(RentalID, RentalDate, NumberOfDays,

  In brief explain your role as an employee of an

briefly describe your role as an employee of an organization in the is field. give examples of what you need to know

  Write program using array that asks user to input 10 numbers

Write a program using array that asks user to input 10 numbers, then calculates the average of those numbers and finds out the total number that is greater or equal to the average.

  Advantages and disadvantages to using cots

What are the advantages and disadvantages to using COTS (Commercial Off-the-Shelf) software versus writing your own software within a company environment? Give some examples of problems you have had.

  How can microsoft windows azure manage file services

Based on the Greiner (2010) article, how can Microsoft Windows Azure manage file services

  Express the definition of function print of the class two

express the definition of function print of the class two.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd