Individual Assignment #3 Instructions: Hacker Culture and MitigationCourse Objective: Examine hacker culture and related psychological and cultural aspects of cybersecurity from both the malicious actor and user’s perspectives.Competencies: Critical thinking, communication skillsEach student may choose one of the following organizations (e.g., a private company or a government agency), attack, or perpetrator and should identify a significant past incident in cybercrime or cyberwarfare related to it. The student will fully discuss the specifics of the cyber incident and analyze the motivation of the threat actors/attackers. Analyze the possible motivations of those who worked to defend assets against disruption, and describe motivations of any possible third-parties that may also have been involved. The student will also suggest methods for the organization to discourage hackers or intruders with similar motives and suggest management, policy or technology controls to protect the organization against similar attacks. Organizations, Attacks, and Perpetrators:Home DepotTargetSonyOffice of Personnel ManagementSaudi Aramco Turbo Tax NASAOperation Aurora US Bureau of Justice StatisticsStuxnet and Flame (US Government?)Dupont ChemicalBoeing Johnson & JohnsonPfizer 4ChanTricare MedicalOpi IsraelSonyNews of the WorldMotorolaOmega Engineering Syrian Electronic Army Njrat The Jester Blue Army Project Chanology The Estonian CyberwarShamoon (Iran?) Your paper should describe the type of incident and the actors: personalities, motivations, and other contributing cultural or psychological characteristics. You will find Module “Psychological Aspects of Cybersecurity” helpful with this assignment. Link your analysis to previous readings, interactive modules, and discussion topics, with appropriate citations.
At a minimum, the questions you must address are listed below: a. What descriptive labels might apply to this type of threat/incident? b. Regarding the threat actors:What sort of people would go after this information?Why would they want it?What will/can they do with it?How would they get it?How would potential attackers be identified? c. How would the organization try to discourage, or reduce the incentives that could attract possible threat actors? d. How would the organization protect against, or reduce damaging effects due to attempted attacks? Length 5-7 pages, due at the end of Week 8.Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document. Individual Assignment #3 Grading Rubic
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download