1. Choose a cyber threat that interests you Identify three potential options for your chosen topic. Using Google and then progressing to the e-library resources and Google Scholar, get a feel for each of the topics and the resources available, and see if one jumps out as especially interesting or viable.Some examples include: cyber-bullying, cyber-espionage, cyber-terrorism, DDOS attacks, disinformation, online child sexual exploitation, online drug trafficking, online firearms trafficking, online fraud, online harassment, online hate, online wildlife trafficking, phishing, ransomware, and SCADA attacks. Consider whether you want to have a global or national focus, and whether you want to be more specific in the threat – e.g. Action Fraud’s A-Z of Fraud lists many types of fraud, many of which are predominantly or partially instigated online

1. Choose a cyber threat that interests you
Identify three potential options for your chosen topic. Using Google and then progressing to the e-library resources and Google Scholar, get a feel for each of the topics and the resources available, and see if one jumps out as especially interesting or viable.Some examples include: cyber-bullying, cyber-espionage, cyber-terrorism, DDOS attacks, disinformation, online child sexual exploitation, online drug trafficking, online firearms trafficking, online fraud, online harassment, online hate, online wildlife trafficking, phishing, ransomware, and SCADA attacks.

Consider whether you want to have a global or national focus, and whether you want to be more specific in the threat – e.g. Action Fraud’s A-Z of Fraud lists many types of fraud, many of which are predominantly or partially instigated online

Reference no: EM132069492

GET HELP WITH YOUR PAPERS

GET THIS ANSWER FROM EXPERTS NOW

WhatsApp
Hello! Need help with your assignments? We are here
Don`t copy text!