3 Discussions and 2 case studies….

Discussion 2.2

Due: Initial Post due Friday, Replies due Sunday

Explain what is the “Nuclear NonProliferation” treaty?

Discussion 3.1

Due: Initial Post due Wednesday, Replies due Sunday

Who or what are non-state hackers? Provide a brief explanation of a non-state hacker. 

Discussion 3.2

Due: Initial Post due Friday, Replies due Sunday

Who do you think is more of a threat to world peace and why?

Case Study 2.1

Due: Sunday, End of Module by 11:55 p.m. EST

The Intelligence Operations Process.  

Writing Requirements

  • 34 pages in length  (excluding cover page, abstract, and reference list)
  • At least 3-4 peer-reviewed sources that are properly cited and referenced

Case Study 3.1

Due: Sunday, End of Module by 11:55 p.m. EST

Describe the following:: zero-day attacks, advanced malware, social engineering and phishing, and strategic Web compromises. Provide a clear explanation of each. 

Writing Requirements

  • 34 pages in length  (excluding cover page, abstract, and reference list)