Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Discussion Topic #1 - Availability Ends 10:00 PM Choose one of the following Case Projects, and/or Reflections and post a discussion (minimum of 100 words)

image text in transcribed
image text in transcribed
Discussion Topic \#1 - Availability Ends 10:00 PM Choose one of the following Case Projects, and/or Reflections and post a discussion (minimum of 100 words) of your thoughts in response to the questions. Be sure to use complete sentences and check your grammar, spelling, and punctuation before making a submission. Module 01 Reflection - Recently a cybercriminal sent $10,000 worth of cryptocurrency to an online charity. The charity that received the donation could not return the cryptocurrency because the cryptocurrency transaction was masked to make it impossible to return. What should the charity do? Should the charity accept the money? If not, what should they do with the cryptocurrency since it cannot be returned? Who should they in turn give it to? And what would be the motivation for an attacker to do this? Are they trying to appear as something more than a "common" cyberthief? Module 02 Reflection - In the Front-Page cybersecurity article at the beginning of this module Zerodium was identified as an entity that sells its knowledge of bug bounties to mainly government organizations who need specific and tailored cybersecurity capabilities and protective solutions. To what extent do you think governments are gathering information on zero-day exploits and then using them or holding them in reserve for the future? Should this be the work of a government? Or should a government who has knowledge of a vulnerability make that information known to the public so that its citizens can secure their systems to be resilient against attacks? Case Project 1-1: Personal Attack Experiences - What type of computer attack have you (or a friend or another student) experienced? When did it happen? What type of computer or device was involved? What type of damage did it inflict? What had to be done to clean up following the attack? How was the computer fixed after the attack? What could have prevented it? List the reason or reasons you think that the attack was successful. Write a one-page paper about these experiences. Note: Post your reply to the topic on this thread. Type your answer in the space provided below. Do NOT attach a document to this thread. You will not receive credit for the post if you attach a document to this or any discussion thread

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions