Your task is to analyze incidents by researching open source resources (such as news stories, government websites and reports, academic
Overview: For this assignment, you will be an analyst investigating threats against the critical infrastructure sector of the target that you identified in the
Module Two discussion. Remember that you are examining sector incidents, not your exact Critical Infrastructure location.
Your task is to analyze incidents by researching open source resources (such as news stories, government websites and reports, academic resources, social media, archived https://www.cisa.gov/publication/daily-open-source…, or other web locations. You will be looking for patterns in the data, direct threats, cyberattacks, and countermeasure opportunities within the sector.
You will be responsible for identifying four significant “sector” incidents (terrorism, cyberattack, surveillance or security related). Because terrorist planning can be long-term, you may consider incidents that are recent, or past incidents in your analysis.
The following is an example of a significant incident: Over the course of five months, you identified two break-ins at electrical plants or energy-related facilities. You also identified two cyberattacks against the energy sector during the same time frame and within the same jurisdictional area. This would be an opportunity to exercise critical thinking, think outside the box, and develop analysis skills.
Not all incidents will be significant: It is your responsibility to determine whether there are any identified threats to the sector.
Prompt: Your task will be to select four significant incidents that impact the critical sector you have identified as your focus for the final project. After analyzing the report, write a short paper that addresses the following critical elements:
In the introduction, identify four significant incidents that impact the critical sector you selected as your focus for this course. When selecting significant incidents, consider incidents that:
o Might have a connection to potential terrorist groups
o Could involve a cyber attack
o Are part of a pattern of security concerns or vulnerabilities
- Describe the actual or potential impact that the selected incidents may have on your sector.
- In your conclusion, assess whether these incidents pose a significant threat to the critical infrastructure sector. Consider patterns or connectionsmade to a specific group or type of adversary. Justify your response with the level of damage that the threat actor either did or could inflict.
- Guidelines for Submission: Your paper should be 2–3 pages (in addition to the references page) and should follow APA formatting: double spacing, 12- point Times New Roman font, and one-inch margins. Remember to include a references page and cite any research you use in your paper.
Answer preview for Your task is to analyze incidents by researching open source resources (such as news stories, government websites and reports, academic
561 Words