Week 4 Discussion –Motivations of Threat Actors For your initial post, discuss all points in the two topics below. Respond to posts from other students. Motivations of Threat Actors – a. Analyze motivations to threat actors that can be influenced by (1) Patriotism or Regional Hegemony, (2) widespread national economic poverty, and (3) world view as a political or social activist. What kinds of targets do each of these influences lead hackers to direct their cyberattacks towards? b. Analyze the influence of anonymity on Cyber Bullying and Cyber Stalking. Background Sources • Wk 4 – Why Hackers Do What They Do Understanding Motivation and Effort.pdf Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects (source) • Wk 4 – Peeping into a Hacker’s Mind.pdf Peeping into a Hacker’s Mind: Can Criminological Theories Explain Hacking? (source) This discussion supports the course objective to design strategies to discover and detect cyberattacks, cyberwarfare, and cyberterrorism. Note: 350 Words count References and Citations APA format 7th edition Week 5 Discussion – Design for Resilience For your initial post, discuss the two topics below. Respond to posts from other students. Design for Resilience – a. Appraise some approaches for managing the development of Software — is it mainly art or mainly science? Describe some recent security failures experienced by Cloud Computing Service Providers, and describe resulting business experiences of various customers. b. Appraise some recommendations by authorities (such as NIST, Carnegie Mellon, DHS) for insuring Cybersecurity Resilience — which of those recommendations by authorities also include suggestions to test to verify the chosen methods for insuring resilience? Background Sources • Wk 5 – A Resilient Europe for an Open Safe and Secure Cyberspace.pdf A Resilient Europe for an Open, Safe and Secure Cyberspace (source) • Wk 5 – The Governance of Network and Information Security In the European Union.pdf The Governance of Network and Information Security In the European Union: The European Public-Private Partnership for Resilience (EP3R) (source) • Wk 5 – IOS Anti-Forensics.pdf IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data? (source) This discussion supports the course objective to design an interdisciplinary plan to appraise, manage, mitigate, and prevent cyberattacks, cyberwarfare, and cyberterrorism. Note: 350 Words count References and Citations APA format 7th edition
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount