|
Dec 26, 2024
|
|
|
|
CRJ 305 - Introduction to Cyber Terrorism Credits: 3 Lecture Hours: 3 Lab Hours: 0 Practicum Hours: 0 Work Experience: 0 Course Type: Open This course explores methods cyber terrorists use to plan, communicate, fund and ultimately wage cyber attacks. Students will consider motivators of prospective actors as well as identify the associated risks to critical infrastructure and key resources through scenarios and case studies. Lastly, an overview of policy and procedural/technical measures will allow participants to consider possible means to protect and defend vulnerable public and private resources. Competencies
- Categorize Cyber Attacks scenarios.
- Define Cyber Terrorism.
- Differentiate Exploitation, Disruption, Destruction
- Classify historical and fictional examples
- Evaluate motivators of Cyber Terror entities.
- Analyze motivations of Nation-State / Foreign Interests
- Classify motivations of Domestic challengers
- Examine motivations of economic competitors
- Differentiate motivations of rogue elements
- Interpret motivations Hacktivists
- Outline vulnerabilities of cyber-related critical infrastructure and key resources.
- Name Physical/Infrastructure elements
- Describe Internet of Things (IoT)
- Generalize Virtual/Logical constructs
- Summarize ?Big data? concepts
- Dissect Techniques of attacks.
- Distinguish Human (social) Engineering
- Summarize Malicious Software (malware)
- Identify Insider Attacks
- Analyze methods of Information Gathering by Cyber Terror entities.
- Discuss Sympathetic/Freedom-of-Information Sites including but not limited to: Wikileaks, Cryptome, and Leaked policies/procedures/legal guides/handbooks/”recipes”
- Review Open-Source Information including but not limited to: Published procedures, Floor-plans of public buildings, Maps of critical infrastructure, Public cameras, Crowd-sourced media/information, Social Network Divulgence
- Explain the cyber-relevance of Formal Education including but not limited to: Online courses, and Digital-versions of Texts
- Examine Methods of Communication by Cyber Terror entities.
- Describe how Websites are utilized including but not limited to: Rumors and Misinformation, Recruitment, and Remote attack deployment
- Explain cyber-related covert communication including but not limited to: Codes, Encryption, Steganography, One-time Use Channels
- Relate Methods of Financial Gain by Cyber Terror entities.
- List Direct/Indirect Contribution methods including but not limited to: ?Charity? sites, Protection Money/Ransom ? Physical Harm, Reputation, Data
- Discuss methods of theft and fraud including but not limited to: ID Theft/Credit Fraud, Banking Interception/Impersonation, Money Laundering through barter or virtual currency
- Extend the implications of Market Influence/Disturbance
- Examine Technical “Tools” used by Cyber Terror entities.
- Describe characteristics of Open-Source Tools including: Free, Less-regulated, Modifiable
- Explain concepts and uses of Concealment Software including: Encryption, Data Hiding/Steganography, Anonymizers (TOR)
- Discuss Malware concepts including Automated Scripts and Documented Author Tools
- Summarize Simulation, Virtual Reality & Virtualization products that could prepare attackers for control and programming of real-world assets
- Discuss impact of Prototypes / Distributed Fabrication methods including 3D Printing and Materials/Parts access
- Discuss prevention/deterrence/mitigation efforts of cyber terror activities.
- Outline efforts related to SCADA / Control Systems, Business / Governmental Computer Systems, Personal and computers/phones
- Describe other technical and non-technical countermeasures
Add to Portfolio (opens a new window)
|
|