Description
Module 1 – SLP
INTRO TO CYBERSECURITY AND TECHNOLOGY
Costs to defend against cyber threats continue to grow as losses mount from cybercrime. Examples of these crimes include retailers such as Target and Home Depot with the loss credit card information, to Sony related loss of company secrets on film releases, and to the US Government, with millions of government employee’s personal data breached. Cybercrime is now an everyday occurrence and estimated annual costs due to these acts have soared into the hundreds of billions of dollars.
For this SLP, answer the following:
1.What are some estimates on the cost of cybercrime to individuals, businesses, and the governments?
2.Describe some significant cybercrime examples (at least one to a government, business and individual). Comment on the actor, target, methods and resulting impact.
SLP Assignment Expectations
Assignments should be 4-5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.
Relevanceâ€â€All content is connected to the question.
Precisionâ€â€Specific question is addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussionâ€â€Present and integrate points that lead to deeper issues.
Breadthâ€â€Multiple perspectives and references, multiple issues/factors considered.
Evidenceâ€â€Points are well-supported with facts, statistics and references.
Logicâ€â€Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
Clarityâ€â€Writing is concise, understandable, and contains sufficient detail or examples.
Objectivityâ€â€Avoids use of first person and subjective bias.
Referencesâ€â€Sources are listed at the end of the paper.
Use strong credible sources – peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s). ___________________________________________________________________________________________
Module 1 – Background
INTRO TO CYBERSECURITY AND TECHNOLOGY
Reading Expectation: Though you may find some of your readings technical, you are not responsible for detailed knowledge, formulas, or other scientifically-oriented material. The expectation is that you have a general working knowledge of the material.
Required Reading
Bakjhi, S. (2013, May 6).
25 Biggest cyber-attacks In history
. Retrieved from
http://list25.com/25-biggest-cyber-attacks-in-hist…
Barnatt, C. (2017, May 14). Computing security. Retrieved from
https://www.explainingcomputers.com/security.html
Bissell, K., Lasalle, R. M., & Dal Cin, P. (2019, March 6).
The cost of cybercrime: Ninth annual cost of cybercrime study
. Retrieved from
https://www.accenture.com/_acnmedia/PDF-96/Accentu…
Read pp. 6–13.
Pomerleau, M. (2015, June 10).
How might the US respond to cyber-attacks?
Retrieved from
https://defensesystems.com/Articles/2015/06/10/US-…
Pomerleau, M. (2015, Sep 30).
Intelligence officials: Cyber domain is still the ‘Wild West.’
Retrieved from
https://defensesystems.com/articles/2015/09/30/ic-…
Required Websites
Surfwatch.
Cyber Risk Intelligence. Retrieved from
https://www.surfwatchlabs.com/threat-categories#Ac…
Optional Reading
Levin A., & Ilkina D. (2013).
International Comparison of Cyber Crime
. Retrieved from
http://www.ryerson.ca/tedrogersschool/privacy/docu…
Ferbrache, D. (2016). How vulnerable are governments to cybercrime? KPMG. Retrieved from
https://home.kpmg.com/xx/en/home/insights/2016/05/…
Module 1 – SLP
INTRO TO CYBERSECURITY AND TECHNOLOGY
Costs to defend against cyber threats continue to grow as losses
mount from cybercrime. Examples of these crimes include retailers
such as Target and Home Depot with the loss credit card
information, to Sony related loss of company secrets on film
releases, and to the US Government, with millions of government
employee’s personal data breached. Cybercrime is now an
everyday occurrence and estimated annual costs due to these acts
have soared into the hundreds of billions of dollars.
For this SLP, answer the following:
1. What are some estimates on the cost of cybercrime to individuals,
businesses, and the governments?
2. Describe some significant cybercrime examples (at least one to a
government, business and individual). Comment on the actor, target,
methods and resulting impact.
SLP Assignment Expectations
Assignments should be 4-5 full pages, double-spaced, not counting
the cover or reference page. Paper format: (a) Cover page, (b)
Header, (c) Body. Submit your assignment by the last day of this
module. Provide quotations to support your responses.
•
•
•
•
•
•
Relevanceâ€â€All content is connected to the question.
Precisionâ€â€Specific question is addressed. Statements, facts, and
statistics are specific and accurate.
Depth of discussionâ€â€Present and integrate points that lead to deeper
issues.
Breadthâ€â€Multiple perspectives and references, multiple issues/factors
considered.
Evidenceâ€â€Points are well-supported with facts, statistics and
references.
Logicâ€â€Presented discussion makes sense; conclusions are logically
supported by premises, statements, or factual information.
•
Clarityâ€â€Writing is concise, understandable, and contains sufficient
detail or examples.
• Objectivityâ€â€Avoids use of first person and subjective bias.
• Referencesâ€â€Sources are listed at the end of the paper.
Use strong credible sources – peer-reviewed references,
government documents, and subject matter expert materials to
support your answer. Your paper will not exceed 5 pages (excluding
cover sheet and reference page(s).
Module 1 – Background
INTRO TO CYBERSECURITY AND TECHNOLOGY
Reading Expectation: Though you may find some of your readings
technical, you are not responsible for detailed knowledge, formulas, or
other scientifically-oriented material. The expectation is that you have a
general working knowledge of the material.
Required Reading
Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks In history. Retrieved
from http://list25.com/25-biggest-cyber-attacks-in-history/1/
Barnatt, C. (2017, May 14). Computing security. Retrieved
from https://www.explainingcomputers.com/security.html
Bissell, K., Lasalle, R. M., & Dal Cin, P. (2019, March 6). The cost of
cybercrime: Ninth annual cost of cybercrime study. Retrieved
from https://www.accenture.com/_acnmedia/PDF-96/Accenture2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50 Read pp. 6–13.
Pomerleau, M. (2015, June 10). How might the US respond to cyberattacks? Retrieved from
https://defensesystems.com/Articles/2015/06/10/US-responsescenario-cyber-attack.aspx
Pomerleau, M. (2015, Sep 30). Intelligence officials: Cyber domain is still
the ‘Wild West.’ Retrieved
from https://defensesystems.com/articles/2015/09/30/ic-congresscyber-wild-west.aspx
Required Websites
Surfwatch. Cyber Risk Intelligence. Retrieved
from https://www.surfwatchlabs.com/threat-categories#Actor
Optional Reading
Levin A., & Ilkina D. (2013). International Comparison of Cyber Crime.
Retrieved from
http://www.ryerson.ca/tedrogersschool/privacy/documents/Ryerson_
International_Comparison_ofCyber_Crime_-March2013.pdf
Ferbrache, D. (2016). How vulnerable are governments to cybercrime?
KPMG. Retrieved
from https://home.kpmg.com/xx/en/home/insights/2016/05/howvulnerable-are-governments-to-cyber-crime.html
Purchase answer to see full
attachment