Computer Science
INSTRUCTIONS
Before you start on this mission, both national organizations want to verify your ability to identify the motivation and capabilities behind cyberterrorism and information warfare. In a 4–5 page report to both organizations, answer the following questions, providing specific details for each topic
Explain the developmental perspective on the problem of and changes to cybervictimization.
Evaluate two current issues, trends, or problems in cybercrime and cyberterrorism.
Analyze the tactics used in cyberspace to share information and promote terrorist ideologies between and within terrorist groups.
Explain why interconnectivity is important in today’s connected environment.
Evaluate the two biggest threats against the national interests of the United States, including critical infrastructure.
Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
Distinguish between different types of bad actors in cyberspace, including their resources, capabilities/techniques, motivations and aversion to risk.