Case Study: Profiling Threats PURPOSE OF ASSIGNMENT This assignment will expose

Case Study: Profiling Threats
PURPOSE OF ASSIGNMENT
This assignment will expose you to current issues and gain insight into present threats to consider appropriate countermeasures. Profiling threats is a core skill for any strategic thinker in cyber security.
The Blackhat USA Conference of 2019 lists a number of different training opportunities. The following is a summary of one such training session:
Achieving Security Awareness Through Social Engineering Attacks
“Learn how to use modern social engineering attack tools and gain a better understanding of physical and network attack vectors. Classroom hands ¬on exercises will include basic open ¬source intelligence (OSINT) skill¬building, risk evaluation of humans, use of the Hak5 Pineapple to conduct WiFi-based spoofing and human attacks, and performing physical computer attacks with the Hak5 Bash Bunny. The emphasis of the class exercises, real¬ world case studies, and demonstrations is on building comprehension of attack techniques that can be used to perform pen testing and create awareness programs. Class activities will introduce students to profiling the online presence of employees and enterprises, as well as performing hands-on attacks against WiFi and physical computers”
ASSIGNMENT DESCRIPTION
Part 1:
Please use 1 pages to create a profile
Based upon what you know about hackers please create a profile of one fake individual named John Jones who would be attending the Blackhat USA Conference and would go to this training session. In your profile be sure to talk about the following assessments regarding the individual.
• Education.
• Background.
• Employment status/description.
• Political affiliation.
• Social movements or interests
• Family/relationship status.
• Activities most likely engaged in.
• List of potential hobbies.
• Social media activities.
• Music and television most likely preferred.
• Sports likely followed (if any).
• What threats does this person pose?
• What are 2 countermeasures you would propose to neutralize the more nefarious actions this person
could take?
REQUIREMENTS
Prepare 1 profile, 1 page long.
The profile should be in the form of a narrative, not a bulleted list. For the profile, address 3 unique threats and 2 unique countermeasures. Make sure you provide a rationale for your assessments of their background.
The countermeasures can be either at the organization or policy level or at the individual level. Make sure to provide a rationale for your choice of countermeasures and supply one piece of external evidence for the efficacy of your solutions.
Also, please describe how you would address the threats posed by this person if they worked for your company. Keep in mind that this person isn’t necessarily a proven or convicted hacker, but simply attended the conference.
Part 2:
Please use 2 pages to evaluate how profiling can help in the strategic planning process for public and private IS programs.
Be sure to address the following:
• Explain how to properly lead the strategic planning and management efforts of private and public sector organizations
• Explain how to evaluate and analyze emerging security issues, and threats
• Explain how to analyze and enhance personnel, and information security
****PLEASE MAKE SURE there is a well-detailed INTRODUCTION to begin the assignment and a CONCLUSION to end the assignment ****
****PLEASE BE SURE TO include at least one titled paragraph for each area.
****PLEASE BE SURE TO assign title subsections when needed****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount