SlideShare a Scribd company logo
1 of 2
2 pg
apa format
3 sources
The threat posed by cyber actors is significant and growing. Do
you agree with the Director of National Intelligence that Cyber
issues have become as important as terrorism as an intelligence
priority?
Reading
Clapper, James R., “U.S. Intelligence Community: Worldwide
Threat Assessment”
Statement for the Record
, February 9, 2016 (see section on Cyber and Technology). pp.
1-4. Click
here
.
McWhorter, Dan, “Exposing One of China’s Cyber Espionage
Units,”
Mandiant Intelligence Center Report
(February 19, 2013), pp. 1-2. Accessed
at:https://www.fireeye.com/blog/threat-
research/2013/02/mandiant-exposes-apt1-chinas-cyber-
espionage-units.html.
Office of the National Counterintelligence Executive. Foreign
Spies Stealing US Economic Secrets in Cyberspace (October
2013). Pages 1-10. Click
here
.
Reveron, Derek S.
Cyberspace and National Security: Threats, Opportunities, and
Power in a Virtual World
, Edited by Derek S. Reverson. Washington, DC: Georgetown
University Press, 2012. (Chapter 4). Pages 57-71.
Singer, Peter.W., “The Cyber Terror Bogeyman,”
The Brookings Institut
e (November 1, 2012). pp. 1-4. Accessed at:
https://www.brookings.edu/articles/the-cyber-terror-bogeyman/:
Symantec.
Internet Security Threat Report
(ISTR), 2015. pp.1-120. Click
here
.

More Related Content

Similar to 2 pgapa format 3 sourcesThe threat posed by cyber acto

On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
Matthew Kurnava
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
wildmandelorse
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
Lillian Ekwosi-Egbulem
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
MarioEliseo3
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
MarioEliseo3
 
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docxWeeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
loganta
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
simisterchristen
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
Ronald E. Laub Jr
 

Similar to 2 pgapa format 3 sourcesThe threat posed by cyber acto (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
Kurnava+Book+Review (1)
Kurnava+Book+Review (1)Kurnava+Book+Review (1)
Kurnava+Book+Review (1)
 
Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - Congress
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump Administration
 
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docxWeeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docx
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
The Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in Cybercrime
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
 

More from mitziesmith74

You are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docxYou are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docx
mitziesmith74
 
You are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docxYou are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docx
mitziesmith74
 
You are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docxYou are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docx
mitziesmith74
 
You are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docxYou are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docx
mitziesmith74
 

More from mitziesmith74 (20)

YOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docx
YOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docxYOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docx
YOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docx
 
You are working at the veterans agency and your caseload includes m.docx
You are working at the veterans agency and your caseload includes m.docxYou are working at the veterans agency and your caseload includes m.docx
You are working at the veterans agency and your caseload includes m.docx
 
You are working as a school counselor and have been working with Mar.docx
You are working as a school counselor and have been working with Mar.docxYou are working as a school counselor and have been working with Mar.docx
You are working as a school counselor and have been working with Mar.docx
 
You are trying to establish uniform standards in your information te.docx
You are trying to establish uniform standards in your information te.docxYou are trying to establish uniform standards in your information te.docx
You are trying to establish uniform standards in your information te.docx
 
You are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docxYou are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docx
 
You are the public health director for the city. The controversial i.docx
You are the public health director for the city. The controversial i.docxYou are the public health director for the city. The controversial i.docx
You are the public health director for the city. The controversial i.docx
 
You are the project manager for a large multi-national project. Team.docx
You are the project manager for a large multi-national project. Team.docxYou are the project manager for a large multi-national project. Team.docx
You are the project manager for a large multi-national project. Team.docx
 
You are the nurse manager on a large unit that has 14 FTE RNs on.docx
You are the nurse manager on a large unit that has 14 FTE RNs on.docxYou are the nurse manager on a large unit that has 14 FTE RNs on.docx
You are the nurse manager on a large unit that has 14 FTE RNs on.docx
 
You are the lead investigator for a major intelligence agency in the.docx
You are the lead investigator for a major intelligence agency in the.docxYou are the lead investigator for a major intelligence agency in the.docx
You are the lead investigator for a major intelligence agency in the.docx
 
You are speaking on the phone with Mike when he asks about what sort.docx
You are speaking on the phone with Mike when he asks about what sort.docxYou are speaking on the phone with Mike when he asks about what sort.docx
You are speaking on the phone with Mike when he asks about what sort.docx
 
You are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docxYou are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docx
 
You are hired as a Chief Technology Officer (CTO) of a startup com.docx
You are hired as a Chief Technology Officer (CTO) of a startup com.docxYou are hired as a Chief Technology Officer (CTO) of a startup com.docx
You are hired as a Chief Technology Officer (CTO) of a startup com.docx
 
You are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docxYou are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docx
 
You are in Johnson County in the deep South. The Sheriff, Jim Jones .docx
You are in Johnson County in the deep South. The Sheriff, Jim Jones .docxYou are in Johnson County in the deep South. The Sheriff, Jim Jones .docx
You are in Johnson County in the deep South. The Sheriff, Jim Jones .docx
 
You are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docxYou are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docx
 
You are going to design a database system for a small university..docx
You are going to design a database system for a small university..docxYou are going to design a database system for a small university..docx
You are going to design a database system for a small university..docx
 
You are either an Egyptian priest or priestess of Bastet, a member o.docx
You are either an Egyptian priest or priestess of Bastet, a member o.docxYou are either an Egyptian priest or priestess of Bastet, a member o.docx
You are either an Egyptian priest or priestess of Bastet, a member o.docx
 
You are currently working as an administrative assistant for a large.docx
You are currently working as an administrative assistant for a large.docxYou are currently working as an administrative assistant for a large.docx
You are currently working as an administrative assistant for a large.docx
 
Quality tools  Complete populating for ANY seven tools with data..docx
Quality tools  Complete populating for ANY seven tools with data..docxQuality tools  Complete populating for ANY seven tools with data..docx
Quality tools  Complete populating for ANY seven tools with data..docx
 
Quality Measure Affecting StakeholdersIntroduction 100 words.docx
Quality Measure Affecting StakeholdersIntroduction 100 words.docxQuality Measure Affecting StakeholdersIntroduction 100 words.docx
Quality Measure Affecting StakeholdersIntroduction 100 words.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 

2 pgapa format 3 sourcesThe threat posed by cyber acto

  • 1. 2 pg apa format 3 sources The threat posed by cyber actors is significant and growing. Do you agree with the Director of National Intelligence that Cyber issues have become as important as terrorism as an intelligence priority? Reading Clapper, James R., “U.S. Intelligence Community: Worldwide Threat Assessment” Statement for the Record , February 9, 2016 (see section on Cyber and Technology). pp. 1-4. Click here . McWhorter, Dan, “Exposing One of China’s Cyber Espionage Units,” Mandiant Intelligence Center Report (February 19, 2013), pp. 1-2. Accessed at:https://www.fireeye.com/blog/threat- research/2013/02/mandiant-exposes-apt1-chinas-cyber- espionage-units.html. Office of the National Counterintelligence Executive. Foreign Spies Stealing US Economic Secrets in Cyberspace (October 2013). Pages 1-10. Click
  • 2. here . Reveron, Derek S. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World , Edited by Derek S. Reverson. Washington, DC: Georgetown University Press, 2012. (Chapter 4). Pages 57-71. Singer, Peter.W., “The Cyber Terror Bogeyman,” The Brookings Institut e (November 1, 2012). pp. 1-4. Accessed at: https://www.brookings.edu/articles/the-cyber-terror-bogeyman/: Symantec. Internet Security Threat Report (ISTR), 2015. pp.1-120. Click here .