Identify the bad actors in cyberspace


Assignment: Cybersecurity Attacks and Defense

OBJECTIVE & PURPOSE:

The purpose of this assignment is to help students be able to: Identify the bad actors in cyberspace, compare and contrast their resources, capabilities/techniques, motivations and aversion to risk (CTH1); Describe different types of cybersecurity attacks and their characteristics (CTH2); Describe potential system attacks and the actors that might perform them (CSF2); Describe cyber defense tools, methods, and components, as well as how to apply cyber defense methods to prepare a system to mitigate attacks (Kill Chain) (CSF3); and Understand the Federal, State, and Local Cyber Defense partners/structures/programs (ISC3)

DESCRIPTION OF THE ASSIGNMENT:

Your assignment will be to develop a written paper that will provide a summary of the following:

• Bad Actors in Cyberspace: Identify the bad actors in cyberspace, compare and contrast their resources, capabilities/techniques, motivations and aversion to risk (Use references to support your claims).

• Types of Cybersecurity Attacks: In your own words (no quotes, but use references to support your claims) describe five different types of cybersecurity attacks and their characteristics.

• Types of System Attacks: In your own words (no quotes, but use references to support your claims) describe three different potential system attacks and the actors that might perform them.

• Cyber Defense: In your own words (no quotes, but use references to support your claims) describe three different cyber defense tools, methods, and components, as well as how to apply cyber defense methods to prepare a system to mitigate attacks (kill chain).

• Cyber Defense Partners/Structures/Programs: In your own words (no quotes, but use references to support your claims), describe the Federal, State, and Local Cyber Defense partners/structures/programs by outlining at least three examples.

• Conclusion: In your own words (no quotes!!!), provide a conclusion that summarises the whole paper.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: Identify the bad actors in cyberspace
Reference No:- TGS02978306

Expected delivery within 24 Hours