Individual Assignment #3 Instructions: Hacker Culture and Mitigation

Individual Assignment #3 Instructions: Hacker Culture and Mitigation Course Objective: Examin" rel="nofollow">ine hacker culture and related psychological and cultural aspects of cybersecurity from both the malicious actor and user's perspectives. Competencies: Critical thin" rel="nofollow">inkin" rel="nofollow">ing, communication skills Each student may choose one of the followin" rel="nofollow">ing organizations (e.g., a private company or a government agency), attack, or perpetrator and should identify a significant past in" rel="nofollow">incident in" rel="nofollow">in cybercrime or cyberwarfare related to it. The student will fully discuss the specifics of the cyber in" rel="nofollow">incident and analyze the motivation of the threat actors/attackers. Analyze the possible motivations of those who worked to defend assets again" rel="nofollow">inst disruption, and describe motivations of any possible third-parties that may also have been in" rel="nofollow">involved. The student will also suggest methods for the organization to discourage hackers or in" rel="nofollow">intruders with similar motives and suggest management, policy or technology controls to protect the organization again" rel="nofollow">inst similar attacks. Organizations, Attacks, and Perpetrators: Home Depot Target Sony Office of Personnel Management Saudi Aramco Turbo Tax NASA Operation Aurora US Bureau of Justice Statistics Stuxnet and Flame (US Government?) Dupont Chemical Boein" rel="nofollow">ing Johnson &Johnson Pfizer 4Chan Tricare Medical Opi Israel Sony News of the World Motorola Omega Engin" rel="nofollow">ineerin" rel="nofollow">ing Syrian Electronic Army Njrat The Jester Blue Army Project Chanology The Estonian Cyberwar Shamoon (Iran?) Your paper should describe the type of in" rel="nofollow">incident and the actors: personalities, motivations, and other contributin" rel="nofollow">ing cultural or psychological characteristics. You will fin" rel="nofollow">ind Module "Psychological Aspects of Cybersecurity" helpful with this assignment. Lin" rel="nofollow">ink your analysis to previous readin" rel="nofollow">ings, in" rel="nofollow">interactive modules, and discussion topics, with appropriate citations. ? At a min" rel="nofollow">inimum, the questions you must address are listed below: a. What descriptive labels might apply to this type of threat/in" rel="nofollow">incident? b. Regardin" rel="nofollow">ing the threat actors: What sort of people would go after this in" rel="nofollow">information? Why would they want it? What will/can they do with it? How would they get it? How would potential attackers be identified? c. How would the organization try to discourage, or reduce the in" rel="nofollow">incentives that could attract possible threat actors? d. How would the organization protect again" rel="nofollow">inst, or reduce damagin" rel="nofollow">ing effects due to attempted attacks? Length 5-7 pages, due at the end of Week 8. Prepare your paper in" rel="nofollow">in Word format. It should be double-spaced with one-in" rel="nofollow">inch margin" rel="nofollow">ins all around. The citations and the reference list in" rel="nofollow">in the paper should be formatted in" rel="nofollow">in accordance with APA 6th edition guidelin" rel="nofollow">ines. Papers must in" rel="nofollow">include: cover page, table of contents, in" rel="nofollow">introduction, section headin" rel="nofollow">ings and subheadin" rel="nofollow">ings, conclusions, APA compliant in" rel="nofollow">in-text citations and list of references, and page numbers. The page count begin" rel="nofollow">ins with the in" rel="nofollow">introduction and ends with the conclusions. The questions asked in" rel="nofollow">in the assignment should first be outlin" rel="nofollow">ined (the outlin" rel="nofollow">ine is not in" rel="nofollow">included in" rel="nofollow">in the document), then the outlin" rel="nofollow">ine should be used to create the Table of Contents and the document sub-headin" rel="nofollow">ings. The Introduction should briefly preview each sub-headin" rel="nofollow">ing in" rel="nofollow">in the document.