Risk Analysis and Security Counter Measure Discussion Identify five different known adversaries and discuss their capabilities.
Choose two potential targets in your city or town and discuss which potential adversaries would want to attack or exploit them and why.
Select two of your classmates posts. Discuss similarities and differences with your identified adversaries and what accounts for those similarities and differences.
Textbook: Risk Analysis and Security Countermeasure Selection, Review Chapter 7
To acess textbook
https://mbsdirect.vitalsource.com/#/
Username kyleseth@ymail.com
Password MaX0802!
Peer post 1
The five types of threat actors are terrorists, economic criminals, violent criminals, subversives, and petty criminals. Defining what a terrorist is pretty difficult as the term is not exactly defined itself. The working definition of a terrorist, is an individual who has a motive whether it is political or religious reasons to change an establish society. A economic criminal from a mugger to a global criminal organization. Violent criminals area those other than terrorists who use the means of violence to achieve their goals. Subversives are protest groups or organizations. Petty criminals can be defined as prostitution, vandalism and invasion of privacy.
Where I live is in a triangle of ideal targets for terrorists. With Baltimore to the north as a major port and localized trade center. To the south is Washington D.C. which is home to the capital of our nation, many landmarks, and embassies of other countries. While this area is also home to many headquarters of intelligence agencies there have in the five years that I have lived here been four separate incidents involving the NSA. One, the suspects were killed in attempt to access the entrance. Another involved a parked car and shooting across a very busy highway injuring some military members. Another was an individual accessing the military base while attempting to escape the police in a chase and blew through one of the gates and escaped into the base casing the base to lockdown. Our country has one of the largest intelligence gathering organizations, which in some countries these individuals feel as if their being invaded and see it as a motive and lash back at the organizations that do this.
Peer post 2
Fellow classmates,
Five different adversaries are terrorists, economic criminals, non-terrorist violent criminals, subversives, and petty criminals (Norman, L. pp. 125-126). It should go without saying that the capabilities of these adversaries are quite diverse, but lets look at some of those capabilities.
Terrorists: The capabilities of terrorists run the gambit from kidnappings, assassinations, espionage, drug manufacturing and distribution, car-bombings, hi-jacking planes and crashing them into buildings, cyber-terrorism, and a host of other capabilities.
Economic criminals: In this category youll find the junkie robbing a store for the money they need for their next fix, drug traffickers, wise guys running book making and loansharking operations, Outlaw Motorcycle Clubs running guns and prostitution rings, career criminals that specialize in robbing banks or armored cars, cyber-criminals and the list goes on.
Non-terrorist violent criminals: Here we find the disgruntled worker and there was a rash of them in the Post Office, a visitor upset with a judges ruling, breaks into the courtroom and starts shooting up the place, rapist and pedophiles, muggers, spousal abusers and other violent criminals.
Subversives: Probably the three most prominent in this category are hackers, industrial spies and paparazzi. Hackers are exceptionally dangerous because if they hack into a companys system they can not only steal proprietary data they can get critical information on employees and customers. Industrial spies are intent on stealing proprietary information from a company or perhaps even sabotaging a companys capabilities. To accomplish this the industrial spy may employ a hacker to make his task that much easier. Paparazzi are an especially annoying group to celebrities. They go through their trash, break into their homes or trespass on their property to get that revealing photo. They claim to be journalists, but theyre little better than the stalkers celebrities must contend with.
Petty criminals: In this last category youll find prostitutes, pickpockets, vandals, which includes both those that physically damage a building like break windows and graffiti artists, drunks and panhandlers. Petty criminals are just that, petty. While they may detract from the traffic a business enjoys, they are little more than a nuisance.
The city government where I live has an IT department and they have firewalls installed on the citys servers, but what they do not have is a person specifically trained and tasked to counter a cybercriminal. A subversive, that is a competent hacker, would have little trouble breaking into the citys server. The potential damage that can be caused is immeasurable. The hacker would have complete access to all the citys financial information, employees vital data like date of birth, and social security numbers. They would also have access to all the police departments files, operations, strategic planning, etc.
The 9/11 hijackers, in my opinion, made a tactical error when they attacked the World Trade Center and the Pentagon. These targets were along the Eastern Coast, which made them relatively easy targets; its easy to attack something along the coast. If they really wanted to have stricken fear into the hearts of Americans, they should have crashed those plans in places like Omaha or Kansas City. That would have sent a powerful message that we arent safe anywhere. I bring this up because the police department where I live is relatively unguarded. There are no gates, or concrete barriers blocking vehicle access. In fact, parking for police vehicles is in the basement of the police department and they only thing blocking access to that is a garage door. If a know Islamic Terrorist organization like ISIS, or al-Qaeda, or a domestic terrorist organization were to drive a truck up the stairs into the lobby of the police department or ram a car through the garage door in the basement and set of a large explosion, that would virtually wipe out the entire police and sheriff departments as they are headquartered in the same building. An attack like that would send a very powerful message to the country: We can get to you anywhere.
References:
Norman, CPP, T. L., PSP, CSC. (2016). Risk Analysis and Security Countermeasure Selection, Second Edition, pp. 125-126.
Why Choose Us
Top quality papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional academic writers
We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.
Free revisions
If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.
On-time delivery
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & confidential
We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all in-text citations. We also promise full confidentiality in all our services.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Our Services
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
Essays
You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.
Admissions
Admission help & business writing
You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.
Reviews
Editing your paper
Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.
Reviews
Revising your paper
Our academic writers and editors will help you with unlimited number of revisions in case you need any customization of your academic papers