304 North Cardinal St.
Dorchester Center, MA 02124
Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take — from seasoned professionals to your non-technical colleagues.
Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up.
Course Final Project: Threat Actors
Please choose one of the following threat actors for this assignment (choose A or B):
(If you are located in Vietnam, please choose option A. If you are located in Iran, please choose option B.)
You will create a slide deck addressing five key areas for your chosen threat actor:
1) Hackers are not all the same; they range in skill, resources, and capability and often go by different names. How would you classify this threat actor? Do they go by any aliases? Where are they from? How would you rate the skill level and resources available to this threat actor? 2) Hackers are motivated to act for specific reasons. What are the motivations of your threat actor? What is the specific geo-political context they are operating in and what insight does that give you for why they are operating in this manner? 3) Hackers utilize specific tradecraft, tactics, and processes to act on their motivations. Describe the range of efforts used by your threat actor to engage in the hacking process. Utilize the Lockheed Martin Kill Chain to help describe those efforts.
4) Hackers utilize the hacking process to achieve certain “end-effects” on their target. Provide examples or case studies of attacks your threat actor has been involved with over the years and describe their primary, secondary, and second order effects.
5) Not all hackers represent a strategic problem for policy makers. How would you characterize your threat actor, are they chiefly a private problem for businesses or a public concern for policy makers? How should policy makers respond?
The slide deck should be no longer than 15-20 slides. You need to incorporate and cite authoritative cyber intelligence sources which can include trusted private sector firms such as FireEye, Symantec, CrowdStrike, etc. (If you are unable to create slides, please simulate your slides with text (for example, uploading a pdf of a MS Word or similar document), indicating Slide 1, Slide 2, etc.)
I hope this Cybersecurity for Everyone Peer-graded Assignment Solution would be useful for you to learn something new from this Course. If it helped you then don’t forget to bookmark our site for more peer graded solutions.
This course is intended for audiences of all experiences who are interested in learning about new skills in a business context; there are no prerequisite courses.
More Peer-graded Assignment Solutions >>