2 discussions and 1 case study and 1 weekly summary

Discussion 2.1 (Half Page with references)

From the lecture and from chapter 2 of the book, What are the types of hackers and what defines them? A hacker’s skills can range from the novice to the very experienced.  What differentiates a novice hacker versus a very experienced hacker?  What are the ways that a hacker can “perfect” their skills?  

Discussion 2.2 (Half page with references) 

From your book, What type of hacker is defined as an Unsophisticated Threat? 

Weekly Summary 2.1 ( 1 page with references)

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

This is not to be a book review, This is a personal capture of your views on the lecture and the course of study.

Case Study 2.1 (3-4 Pages)

Conduct research on one of the following attacks (Clop Ransomware, Zeus Gameover, Ransomeware as a Service, Fleeceware, Internet of Things Device Attacks, Cryptojacking, or Artificial Intelligence (AI) Attacks). In a 3 to 4 page paper (not including title and reference pages) provide a brief synopsis of the attack. Use what you’ve learned in the first 3 chapters of the course.  Some information that should be included in your paper is, the type of attack, why the attack occurred, and who conducted the attack. Be sure to cite your sources and follow APA formatting. Some sources for the attacks can be found by doing online research. 

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • At least 3-4 peer-reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

BOTH BOOK AND LECTURES NOTES FROM PROFESSOR ATTACHED PLEASE GO THROUGH IT ….

Tags: No tags