Order from us for quality, customized work in due time of your choice.
For this activity, create a presentation and post it in the discussion thread. Follow the instructions below:
Choose one of the posted presentations from last module week’s discussion as your target.
Next, choose from among the following adversary types:
Nation-state (very sophisticated)
Organized cybercrime (sophisticated)
Activist/lone hacker (somewhat sophisticated)
Describe who you are and what you are targeting (reference the discussion post). Write one to two paragraphs (100–200 words total) on why you are targeting the chosen system.
Next, include an argument to your customer about what the potential profit from going after this target might be and how much it might be. Estimation is fine (i.e., the organization’s annual revenue is X, and their systems could likely be ransomed for Y). Include how much time and money you would be willing to spend to compromise the system before abandoning the attack.
Now, evaluate the cybersecurity product:
Research the cybersecurity product the post has chosen to improve its cybersecurity posture.
Mention the product and how it secures the target system. How does the presence of this product impact the cost-benefit of going after the target?
Do not wait until the end of the module week—endeavor to make your initial post as early as possible.
Respond to two classmates’ presentations by choosing a different type of malicious actor than the presenter did, and explain why they might be motivated to attack the target system.
Order from us for quality, customized work in due time of your choice.