Discuss the “costs” of cyber security both intrusions and prevention. Include but go beyond typical monetary costs. Discuss the threat landscape to include but not limited to social engineering and next generation threats. Discuss transformational changes to cybersecurity including but not limited to virtualization, social media, the internet of things, and “big data.”
Textbook:
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.
Sample Solution