Bad Actors in Cyberspace: Identify the bad actors in cyberspace, compare and contrast their resources,
capabilities/techniques, motivations and aversion to risk (Use references to support your claims).
Types of Cybersecurity Attacks: In your own words (no quotes, but use references to support your claims)
describe five different types of cybersecurity attacks and their characteristics.
Types of System Attacks: In your own words (no quotes, but use references to support your claims) describe
three different potential system attacks and the actors that might perform them.
Cyber Defense: In your own words (no quotes, but use references to support your claims) describe three
different cyber defense tools, methods, and components, as well as how to apply cyber defense methods to
prepare a system to mitigate attacks (kill chain).
Cyber Defense Partners/Structures/Programs: In your own words (no quotes, but use references to support
your claims), describe the Federal, State, and Local Cyber Defense partners/structures/programs by outlining
at least three examples.
Sample Solution