Welcome to Premium Paper Help

premiumpaperhelp.com logo

Our Services

Get 15% Discount on your First Order

Hacker Group Presentation Hacking, like many parts of our society today, has gone from an almost “hobbyist” level to a massive

Hacker Group Presentation

Hacking, like many parts of our society today, has gone from an almost “hobbyist” level to a massive global “business”. At the top of the pile are threat actors with a high level of skill and vast resources.

These threat actors come in a variety of guises—there are APT groups, CaaS (Cybercrime-as-a-Service) groups, and hacktivists. Some of these groups have stood out by their actions, their longevity, their methods, or a combination of all three.

This is an individual assignment.


PRESENTATION

For this project, you will select one of these groups to research and then prepare a presentation on your findings. The presentation needs to be 5-7 minutes and should contain slides.


TOPIC

Choose an APT or hacker group from the following resource lists:

·
List of hacker groups

·
Links to an external site.

·

·
Advanced Persistent Threat Groups (APT Groups)

·
Links to an external site.

·

(Your choice is not limited to the groups you find here.)

Your assignment is to create a presentation of approximately 5-7 minutes in length, and needs to address the following questions:

·
Origins

· Where did they originate from?

· What are the demographics of the group?

· How long have they been operating for?

·
Achievements or notable attacks

· What are the hacks or activities that made them notable?

· Who or what were their primary targets?

· What techniques are they known for and which tools do they typically use?

·
Significance

· What has been the impact of their actions?

· Did the group affect history in any way?

· Are they actively changing our society or culture for better or worse?

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

   ETHICS, CYBER ETHICS, AND SECURITY Transforming Nursing ETHICS, CYBER ETHICS, AND

   ETHICS, CYBER ETHICS, AND SECURITY Transforming Nursing ETHICS, CYBER ETHICS, AND SECURITY Read a selection of your colleagues’ responses and respond to two of your colleagues by expanding upon their responses or sharing additional or alternative perspectives. PEER #1 · Courtney Cole Hiscox Challenges In today’s digital age, cybersecurity stands as a paramount

please complete an annotated bibliography for journal articles on The Power of Touch in Romantic Relationships or a nonverbal behavior dealing with touch.

please complete an annotated bibliography for journal articles on The Power of Touch in Romantic Relationships or a nonverbal behavior dealing with touch. Create an APA-style reference section and annotating each of your articles under each APA-style reference. Use bullets to summarize the following in your own words: what the researchers did