SlideShare a Scribd company logo
1 of 5
Individual Assignment #3 Instructions: Hacker Culture and
Mitigation
Course Objective:
Examine hacker culture and related psychological and cultural
aspects of cybersecurity from both the malicious actor and
user's perspectives.
Competencies:
Critical thinking, communication skills
Each student may choose one of the following organizations
(e.g., a private company or a government agency), attack, or
perpetrator and should identify a significant past incident in
cybercrime or cyberwarfare related to it. The student will fully
discuss the specifics of the cyber incident and analyze the
motivation of the threat actors/attackers. Analyze the possible
motivations of those who worked to defend assets against
disruption, and describe motivations of any possible third-
parties that may also have been involved. The student will also
suggest methods for the organization to discourage hackers or
intruders with similar motives and suggest management, policy
or technology controls to protect the organization against
similar attacks.
Organizations, Attacks, and Perpetrators:
Home Depot
Target
Sony
Office of Personnel Management
Saudi Aramco
Turbo Tax
NASA
Operation Aurora
US Bureau of Justice Statistics
Stuxnet and Flame (US Government?)
Dupont Chemical
Boeing
Johnson & Johnson
Pfizer
4Chan
Tricare Medical
Opi Israel
Sony
News of the World
Motorola
Omega Engineering
Syrian Electronic Army
Njrat
The Jester
Blue Army
Project Chanology
The Estonian Cyberwar
Shamoon (Iran?)
Your paper should describe the type of incident and the actors:
personalities, motivations, and other contributing cultural or
psychological characteristics. You will find Module
"Psychological Aspects of Cybersecurity" helpful with this
assignment. Link your analysis to previous readings, interactive
modules, and discussion topics, with appropriate citations.
At a minimum, the questions you must address are listed below:
a. What descriptive labels might apply to this type of
threat/incident?
b. Regarding the threat actors:
What sort of people would go after this information?
Why would they want it?
What will/can they do with it?
How would they get it?
How would potential attackers be identified?
c. How would the organization try to discourage, or reduce the
incentives that could attract possible threat actors?
d. How would the organization protect against, or reduce
damaging effects due to attempted attacks?
Length 5-7 pages, due at the end of Week 8.
Prepare your paper in Word format. It should be double-spaced
with one-inch margins all around. The citations and the
reference list in the paper should be formatted in accordance
with APA 6th edition guidelines.
Papers must include: cover page, table of contents, introduction,
section headings and subheadings, conclusions, APA compliant
in-text citations and list of references, and page numbers. The
page count begins with the introduction and ends with the
conclusions. The questions asked in the assignment should first
be outlined (the outline is not included in the document), then
the outline should be used to create the Table of Contents and
the document sub-headings. The Introduction should briefly
preview each sub-heading in the document.
Individual Assignment #3 Grading Rubic
Criteria
Excellent A (90+)
Satisfactory B (80-89)
Needs Improvement (below 80)
Content (80%)
Clarity of cyber threats
(25%)
The incident is thoroughly developed and clearly stated.
The incident is adequately developed and clearly stated.
The incident is neither adequately developed nor clearly stated.
Analysis of motivation
(20%)
Analysis of actors’ motivation is thorough. Various actors
(attackers, defenders, third-parties) are included.
Analysis of actors’ motivation is adequate. Motivation of
attackers and defenders are included.
The analysis presented is incomplete.
Clarity of methods of organizational response
(25%)
Methods organizations can use to discourage actors and similar
attacks are thoroughly discussed and logical presented.
Methods organizations can use to discourage actors and similar
attacks are adequately discussed and logically presented.
Methods organizations can use to discourage actors and similar
attacks are not adequately discussed or logically presented.
Quality of documented support
(10%)
The discussion in the paper is based on a thorough review of the
literature, which is not limited to news articles, but also
includes scholarly resources such as studies or reports from
agencies or organizations.
The discussion in the paper is based on an adequate review of
the literature.
The scope of the research presented in the paper is inadequate.
Heavy reliance on reference material (e.g. Wikipedia, exam
prep books, “Dummies” guides).
Form (20%)
Organization
(10%)
The Table of Contents (TOC) and the document sub-headings
reflect a careful outline of the questions asked in the
assignment. The content is well organized with clear transitions
among major subtopics.
The content is generally well organized with some improvement
possible in transitions among subtopics.
The organization of the content is confusing without clear
transitions among subtopics.
Writing style
(5%)
The introduction is written to give a preview of each sub-
heading topic. Graduate-level writing is reflected throughout
the paper, including accurate spelling, punctuation, grammar,
and sentence structure.
Writing is acceptable, with a few errors in spelling,
punctuation, grammar, and/or sentence structure.
Writing does not meet graduate standards. Unacceptable number
of errors in spelling, punctuation, grammar and/or sentence
structure.
Use of proper APA formatting
(5%)
In-text citations are in proper APA format and all sources are
identified in the reference list and cited in proper APA format.
Minor errors in citation identification and/or APA format.
Unacceptable number of errors in citation identification and/or
APA format.
Your Grade:
Additional Comments:

More Related Content

Similar to Individual Assignment #3 Instructions  Hacker Culture and Mitigatio.docx

The Reflection Paper supports the three learning outcomes for the
The Reflection Paper supports the three learning outcomes for the The Reflection Paper supports the three learning outcomes for the
The Reflection Paper supports the three learning outcomes for the
GrazynaBroyles24
 
Risk Assessment Report InstructionsINFA 610 BackgroundThis i.docx
Risk Assessment Report InstructionsINFA 610 BackgroundThis i.docxRisk Assessment Report InstructionsINFA 610 BackgroundThis i.docx
Risk Assessment Report InstructionsINFA 610 BackgroundThis i.docx
SUBHI7
 
Final Paper InstructionsPurposeThis assignment will address th
Final Paper InstructionsPurposeThis assignment will address thFinal Paper InstructionsPurposeThis assignment will address th
Final Paper InstructionsPurposeThis assignment will address th
ChereCheek752
 
Module 4 Report Writing and ResearchCommentaryTopicsResearc.docx
Module 4 Report Writing and ResearchCommentaryTopicsResearc.docxModule 4 Report Writing and ResearchCommentaryTopicsResearc.docx
Module 4 Report Writing and ResearchCommentaryTopicsResearc.docx
moirarandell
 
COM425 Grading Rubric Assignment Final Paper The purp.docx
COM425 Grading Rubric Assignment Final Paper The purp.docxCOM425 Grading Rubric Assignment Final Paper The purp.docx
COM425 Grading Rubric Assignment Final Paper The purp.docx
monicafrancis71118
 
1 University of Houston Victoria .docx
 1 University of Houston Victoria                       .docx 1 University of Houston Victoria                       .docx
1 University of Houston Victoria .docx
aryan532920
 
BUSI 505Final Project Overall Assignment InstructionsOverview
BUSI 505Final Project Overall Assignment InstructionsOverviewBUSI 505Final Project Overall Assignment InstructionsOverview
BUSI 505Final Project Overall Assignment InstructionsOverview
VannaSchrader3
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
lefrancoishazlett
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
helzerpatrina
 
Class PSL7020 Unit 3Part OneIn this first component, identif.docx
Class PSL7020 Unit 3Part OneIn this first component, identif.docxClass PSL7020 Unit 3Part OneIn this first component, identif.docx
Class PSL7020 Unit 3Part OneIn this first component, identif.docx
clarebernice
 
Risk Assessment Report InstructionsINFA 610BackgroundThi.docx
Risk Assessment Report InstructionsINFA 610BackgroundThi.docxRisk Assessment Report InstructionsINFA 610BackgroundThi.docx
Risk Assessment Report InstructionsINFA 610BackgroundThi.docx
infantkimber
 
Attached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docxAttached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docx
jaggernaoma
 

Similar to Individual Assignment #3 Instructions  Hacker Culture and Mitigatio.docx (16)

The Reflection Paper supports the three learning outcomes for the
The Reflection Paper supports the three learning outcomes for the The Reflection Paper supports the three learning outcomes for the
The Reflection Paper supports the three learning outcomes for the
 
Risk Assessment Report InstructionsINFA 610 BackgroundThis i.docx
Risk Assessment Report InstructionsINFA 610 BackgroundThis i.docxRisk Assessment Report InstructionsINFA 610 BackgroundThis i.docx
Risk Assessment Report InstructionsINFA 610 BackgroundThis i.docx
 
Cis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer newCis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer new
 
Cis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer newCis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer new
 
Cis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer newCis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer new
 
Cis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer newCis 560 week 10 term paper – strayer new
Cis 560 week 10 term paper – strayer new
 
Final Paper InstructionsPurposeThis assignment will address th
Final Paper InstructionsPurposeThis assignment will address thFinal Paper InstructionsPurposeThis assignment will address th
Final Paper InstructionsPurposeThis assignment will address th
 
Module 4 Report Writing and ResearchCommentaryTopicsResearc.docx
Module 4 Report Writing and ResearchCommentaryTopicsResearc.docxModule 4 Report Writing and ResearchCommentaryTopicsResearc.docx
Module 4 Report Writing and ResearchCommentaryTopicsResearc.docx
 
COM425 Grading Rubric Assignment Final Paper The purp.docx
COM425 Grading Rubric Assignment Final Paper The purp.docxCOM425 Grading Rubric Assignment Final Paper The purp.docx
COM425 Grading Rubric Assignment Final Paper The purp.docx
 
1 University of Houston Victoria .docx
 1 University of Houston Victoria                       .docx 1 University of Houston Victoria                       .docx
1 University of Houston Victoria .docx
 
BUSI 505Final Project Overall Assignment InstructionsOverview
BUSI 505Final Project Overall Assignment InstructionsOverviewBUSI 505Final Project Overall Assignment InstructionsOverview
BUSI 505Final Project Overall Assignment InstructionsOverview
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
 
Womens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docxWomens Reproductive RightsWomens reproductive rights are contr.docx
Womens Reproductive RightsWomens reproductive rights are contr.docx
 
Class PSL7020 Unit 3Part OneIn this first component, identif.docx
Class PSL7020 Unit 3Part OneIn this first component, identif.docxClass PSL7020 Unit 3Part OneIn this first component, identif.docx
Class PSL7020 Unit 3Part OneIn this first component, identif.docx
 
Risk Assessment Report InstructionsINFA 610BackgroundThi.docx
Risk Assessment Report InstructionsINFA 610BackgroundThi.docxRisk Assessment Report InstructionsINFA 610BackgroundThi.docx
Risk Assessment Report InstructionsINFA 610BackgroundThi.docx
 
Attached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docxAttached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docx
 

More from EstelaJeffery653

Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docxIndividual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
EstelaJeffery653
 
Individual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docxIndividual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docx
EstelaJeffery653
 
Individual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docxIndividual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docx
EstelaJeffery653
 
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docxIndividual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
EstelaJeffery653
 
Individual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docxIndividual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docx
EstelaJeffery653
 

More from EstelaJeffery653 (20)

Individual ProjectMedical TechnologyWed, 9617Num.docx
Individual ProjectMedical TechnologyWed, 9617Num.docxIndividual ProjectMedical TechnologyWed, 9617Num.docx
Individual ProjectMedical TechnologyWed, 9617Num.docx
 
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docxIndividual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
Individual ProjectThe Post-Watergate EraWed, 3817Numeric.docx
 
Individual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docxIndividual ProjectArticulating the Integrated PlanWed, 31.docx
Individual ProjectArticulating the Integrated PlanWed, 31.docx
 
Individual Multilingualism Guidelines1)Where did the a.docx
Individual Multilingualism Guidelines1)Where did the a.docxIndividual Multilingualism Guidelines1)Where did the a.docx
Individual Multilingualism Guidelines1)Where did the a.docx
 
Individual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docxIndividual Implementation Strategiesno new messagesObjectives.docx
Individual Implementation Strategiesno new messagesObjectives.docx
 
Individual Refine and Finalize WebsiteDueJul 02View m.docx
Individual Refine and Finalize WebsiteDueJul 02View m.docxIndividual Refine and Finalize WebsiteDueJul 02View m.docx
Individual Refine and Finalize WebsiteDueJul 02View m.docx
 
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docxIndividual Cultural Communication Written Assignment  (Worth 20 of .docx
Individual Cultural Communication Written Assignment  (Worth 20 of .docx
 
Individual ProjectThe Basic Marketing PlanWed, 3117N.docx
Individual ProjectThe Basic Marketing PlanWed, 3117N.docxIndividual ProjectThe Basic Marketing PlanWed, 3117N.docx
Individual ProjectThe Basic Marketing PlanWed, 3117N.docx
 
Individual ProjectFinancial Procedures in a Health Care Organiza.docx
Individual ProjectFinancial Procedures in a Health Care Organiza.docxIndividual ProjectFinancial Procedures in a Health Care Organiza.docx
Individual ProjectFinancial Procedures in a Health Care Organiza.docx
 
Individual Expanded Website PlanView more »Expand view.docx
Individual Expanded Website PlanView more  »Expand view.docxIndividual Expanded Website PlanView more  »Expand view.docx
Individual Expanded Website PlanView more »Expand view.docx
 
Individual Expanded Website PlanDueJul 02View more .docx
Individual Expanded Website PlanDueJul 02View more .docxIndividual Expanded Website PlanDueJul 02View more .docx
Individual Expanded Website PlanDueJul 02View more .docx
 
Individual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docxIndividual Communicating to Management Concerning Information Syste.docx
Individual Communicating to Management Concerning Information Syste.docx
 
Individual Case Analysis-MatavIn max 4 single-spaced total pag.docx
Individual Case Analysis-MatavIn max 4 single-spaced total pag.docxIndividual Case Analysis-MatavIn max 4 single-spaced total pag.docx
Individual Case Analysis-MatavIn max 4 single-spaced total pag.docx
 
Individual Assignment Report Format• Report should contain not m.docx
Individual Assignment Report Format• Report should contain not m.docxIndividual Assignment Report Format• Report should contain not m.docx
Individual Assignment Report Format• Report should contain not m.docx
 
Include LOCO api that allows user to key in an address and get the d.docx
Include LOCO api that allows user to key in an address and get the d.docxInclude LOCO api that allows user to key in an address and get the d.docx
Include LOCO api that allows user to key in an address and get the d.docx
 
Include the title, the name of the composer (if known) and of the .docx
Include the title, the name of the composer (if known) and of the .docxInclude the title, the name of the composer (if known) and of the .docx
Include the title, the name of the composer (if known) and of the .docx
 
include as many events as possible to support your explanation of th.docx
include as many events as possible to support your explanation of th.docxinclude as many events as possible to support your explanation of th.docx
include as many events as possible to support your explanation of th.docx
 
Incorporate the suggestions that were provided by your fellow projec.docx
Incorporate the suggestions that were provided by your fellow projec.docxIncorporate the suggestions that were provided by your fellow projec.docx
Incorporate the suggestions that were provided by your fellow projec.docx
 
inal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docx
inal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docxinal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docx
inal ProjectDUE Jun 25, 2017 1155 PMGrade DetailsGradeNA.docx
 
include 1page proposal- short introduction to research paper and yo.docx
include 1page proposal- short introduction to research paper and yo.docxinclude 1page proposal- short introduction to research paper and yo.docx
include 1page proposal- short introduction to research paper and yo.docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Individual Assignment #3 Instructions  Hacker Culture and Mitigatio.docx

  • 1. Individual Assignment #3 Instructions: Hacker Culture and Mitigation Course Objective: Examine hacker culture and related psychological and cultural aspects of cybersecurity from both the malicious actor and user's perspectives. Competencies: Critical thinking, communication skills Each student may choose one of the following organizations (e.g., a private company or a government agency), attack, or perpetrator and should identify a significant past incident in cybercrime or cyberwarfare related to it. The student will fully discuss the specifics of the cyber incident and analyze the motivation of the threat actors/attackers. Analyze the possible motivations of those who worked to defend assets against disruption, and describe motivations of any possible third- parties that may also have been involved. The student will also suggest methods for the organization to discourage hackers or intruders with similar motives and suggest management, policy or technology controls to protect the organization against similar attacks. Organizations, Attacks, and Perpetrators: Home Depot Target Sony Office of Personnel Management Saudi Aramco Turbo Tax NASA Operation Aurora US Bureau of Justice Statistics Stuxnet and Flame (US Government?) Dupont Chemical Boeing Johnson & Johnson
  • 2. Pfizer 4Chan Tricare Medical Opi Israel Sony News of the World Motorola Omega Engineering Syrian Electronic Army Njrat The Jester Blue Army Project Chanology The Estonian Cyberwar Shamoon (Iran?) Your paper should describe the type of incident and the actors: personalities, motivations, and other contributing cultural or psychological characteristics. You will find Module "Psychological Aspects of Cybersecurity" helpful with this assignment. Link your analysis to previous readings, interactive modules, and discussion topics, with appropriate citations. At a minimum, the questions you must address are listed below: a. What descriptive labels might apply to this type of threat/incident? b. Regarding the threat actors: What sort of people would go after this information? Why would they want it? What will/can they do with it? How would they get it? How would potential attackers be identified? c. How would the organization try to discourage, or reduce the
  • 3. incentives that could attract possible threat actors? d. How would the organization protect against, or reduce damaging effects due to attempted attacks? Length 5-7 pages, due at the end of Week 8. Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document. Individual Assignment #3 Grading Rubic Criteria Excellent A (90+) Satisfactory B (80-89) Needs Improvement (below 80) Content (80%) Clarity of cyber threats (25%) The incident is thoroughly developed and clearly stated. The incident is adequately developed and clearly stated. The incident is neither adequately developed nor clearly stated. Analysis of motivation (20%)
  • 4. Analysis of actors’ motivation is thorough. Various actors (attackers, defenders, third-parties) are included. Analysis of actors’ motivation is adequate. Motivation of attackers and defenders are included. The analysis presented is incomplete. Clarity of methods of organizational response (25%) Methods organizations can use to discourage actors and similar attacks are thoroughly discussed and logical presented. Methods organizations can use to discourage actors and similar attacks are adequately discussed and logically presented. Methods organizations can use to discourage actors and similar attacks are not adequately discussed or logically presented. Quality of documented support (10%) The discussion in the paper is based on a thorough review of the literature, which is not limited to news articles, but also includes scholarly resources such as studies or reports from agencies or organizations. The discussion in the paper is based on an adequate review of the literature. The scope of the research presented in the paper is inadequate. Heavy reliance on reference material (e.g. Wikipedia, exam prep books, “Dummies” guides). Form (20%) Organization (10%) The Table of Contents (TOC) and the document sub-headings reflect a careful outline of the questions asked in the assignment. The content is well organized with clear transitions among major subtopics. The content is generally well organized with some improvement possible in transitions among subtopics. The organization of the content is confusing without clear transitions among subtopics. Writing style
  • 5. (5%) The introduction is written to give a preview of each sub- heading topic. Graduate-level writing is reflected throughout the paper, including accurate spelling, punctuation, grammar, and sentence structure. Writing is acceptable, with a few errors in spelling, punctuation, grammar, and/or sentence structure. Writing does not meet graduate standards. Unacceptable number of errors in spelling, punctuation, grammar and/or sentence structure. Use of proper APA formatting (5%) In-text citations are in proper APA format and all sources are identified in the reference list and cited in proper APA format. Minor errors in citation identification and/or APA format. Unacceptable number of errors in citation identification and/or APA format. Your Grade: Additional Comments: