Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Contemporary Issues and Methods: Anonymous

In today's world, technology must be considered when examining the psychology of espionage. Additionally, societal response is a key in understanding the impact of these acts.

In this assignment, you will have the opportunity to analyze the relationship between cyber activity compromising national security information and the social media response.

The government organization for which you work has taken notice of the actions of a group named "Anonymous" against the Church of Scientology, among others.

In order to better prepare, your organization wants you to analyze, from a forensic psychological perspective, a potentially significant compromise of national security information via a cyber attack.

You have been instructed to use the attack on Scientology, the HBGary attack, or other significant cyber attacks credited to Anonymous as your basis of comparison.

Tasks:

Using the Argosy University online library resources and other reputable, valid sources, research the group Anonymous and its cyber-hacking activities, paying particular attention to the actions against the group's methods.

Use your interrogatories (who, what, where, when, how, and why) to guide your research.

Write a 10- to 12-page report that analyzes the impact this group has (or may have) on the U.S. (societal impact, including economic and infrastructure), corporate America (business impact), and the government (political impact).

In your report, address the following:

Provide a synopsis of the group's methods, goals, and activities. Make sure you address its actions against its target as well as its overall activities, goals, and methods.

Also, include an explanation of the group's members and its makeup (e.g., the demographics and characteristics of the group members).

Discuss motivations and possible explanations for the group's behavior. Identify the psychological constructs and processes and explain the group's actions.

For example, describe what types of social psychological constructs reinforce its membership. Social psychology research on group dynamics will help in this explanation.

Analyze the impact of a potential attack on the US government. At minimum, address the following:

How vulnerable is the US government to a potential cyber attack?

What parts of the IC are most affected by a potential cyber attack on US systems? Why?

Analyze the impact of a potential attack on society. At minimum, address the following:

What role would the social media play in future incidents of espionage and counterintelligence (CI) activities?

What would be society's response to the attack? Would society be supportive or nonsupportive? How would it be divided? Justify your answers.

What would be the real and intangible consequences of Anonymous's hacking activities? What would be the positive and negative impacts of its actions on society? Overall, would society benefit from or be hurt by such actions? Justify your answers.

Summarize key points and provide a conclusion, based on your analysis, of what can be done in the IC to avoid future compromises.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92428100

Have any Question?


Related Questions in Computer Network & Security

Assignment- javafx and model-view separationyou are to

Assignment- JavaFX and Model-View separation You are to implement a JavaFX project that separates its model (application data and logic) from its view and controller (the JavaFX controls and event handlers that create th ...

If a firms total cost function is given byt c

If a firm's total cost function is given byT C= 115,000Q-500Q2+Q3, what range of output does the firm have economies of scale?

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

Assignment wireless applications advances advantages and

Assignment : Wireless Applications, Advances, Advantages, and Disadvantages The adoption of wireless technologies varies from one industry to another, and is often based on the benefits provided versus the challenges, im ...

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As