Continue your open source research on your CIKR entity, but now take the point of view of the attacker.
Build a target model based on the readings in Lewis and in Clark. How many models can you make? E.g. what does the cooperative relationships model look like? Does your CIKR entity interface with other organizations?
What about a bureaucratic model of the organization? Can you identify personnel who work at the entity? Can you find contact information online associated with them?
Can you learn what kind of devices they use? Can you find IP addresses and DNS records for their organization?
Based on this new information, what kind of attack would you launch against the target?
Write about a bureaucratic model of the organization? Can you identify personnel who work at the entity?
Have no time to work on your essay? Well, we do.
We will write an essay crafted to your needs.
On-time submission and academic qualities are guaranteed.
Have no time to work on your essay? Well, we do.
We will write an essay crafted to your needs.
On-time submission and academic qualities are guaranteed.
by
Tags: