Page 1 of 1 Background In the past several years, the list of companies whose internal systems have been hacked has grown rapidly. Unfortunately,

Page 1 of 1

Background

In the past several years, the list of companies whose internal systems have been hacked
has grown rapidly. Unfortunately, investment in security measures is only part of the answer.
To be effective, managers in charge of cybersecurity need to adjust their mindsets and
become as open and adaptive as possible. This MIT Sloan Management Review article
elaborates on why companies need to understand hackers’ tactics and mindsets, and how
to achieve these using a framework drawn from the knowledge and opinions of experts.

Instructions

Download the article from D2L à Content à Week 8 à Assignment 4 folder.

Submit your answers to article-related questions in D2L no later than Sunday Oct 27th, 11:30
p.m.

• Up to three pages
• Font: Calibri, Font Size: 11, Line Space: 1.0
• APA Citation Format (if needed)

Article-Related Questions

1. Why is it less common for today’s hackers to work independently?
2. Based on what you read in this article, how do you describe a hacker in terms of

personality traits and behavioral characteristics?
3. Why an experienced hacker will not attack a new system a company has just

activated? Isn’t a new system more vulnerable among various forms of attacks?
4. Summarize the discussed framework on the process that hackers employ to attack

an organization.
5. What have you learned from this article? As a future manager, what will you take

away from this article?

Grading

This assignment values 10 points of your grade.

**Use your critical thinking skills and discuss the questions from multiple perspectives. This
is NOT a short-answer assignment.

CSEC 340

Assignment 4: To Improve Cybersecurity, Think Like a
Hacker.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Health Information Exchange HIT 101: Foundations of HIT, Week 5: HIE Paper

Health Information Exchange HIT 101: Foundations of HIT, Week 5: HIE Paper AHIMA 2018 Competency · III.7 Summarize standards for the exchange of health information Instructions: For this week 5 homework the focus was on Health Information Exchange (HIE). Summarize the standards for the exchange of HIE by writing one-page

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains how information systems affect business processes within the healthcare industry. 7035.1.2 :  Systems Development The graduate analyzes the different methods of system development for the purpose of recommending an appropriate method for a project. 7035.1.3 :  Health Information

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital mechanics calculations and pioneered the use of computers. During her 33-year tenure at NASA, Johnson calculated trajectories, launch windows, and emergency return courses for the Project Mercury, Apollo

Computer Hardware & Software Project OBJECTIVES: Successful completion of this assignment demonstrates your understanding of the following course

Computer Hardware & Software Project OBJECTIVES: Successful completion of this assignment demonstrates your understanding of the following course level outcomes: 1. Explain the functions of hardware, software, data, procedures, and people in a business computer system. 2. Identify the major hardware elements of a computer system and describe the purpose