Research Activity: Terrorist Tactics, Weapons, and Targets: Gathering the Data
This research activity will help you use resources and databases to collect the data that you need to analyze security concerns.
There are common tactical methods used by terrorist organizations (political, religious, ethnic, and ideological). During the threat assessment process, it is important to determine which weapons and tactics a threat actor could use against a critical infrastructure sector or key asset.
The key to threat assessment is collecting objective, valid, and relevant intelligence information (data collection) about the activities of potential threat actors.
All risk analysis is based on gathering the right data to make informed decisions and to recommend appropriate countermeasures. Significant security concerns to critical infrastructure are the existence of threats, history of threats, intention of threat, capability of threat and targeting.
The goal for this activity is to explore key resources, locate specific data, and address threat assessment questions related to each of these security concerns.
Prompt
Use the Module Three Research Activity Worksheet to complete this assignment. Specifically, the following critical elements must be addressed:
Part One: Existence of Threat: Identify the jurisdictions (locations) where the Animal Liberation Front has conducted attacks.
Part Two
History of Threat
Identify the total number of attacks.
Identify whether the greatest threat was from groups or lone actors.
Describe the method of attacks.
Part Three: Intention of Threat: Choose one Foreign Terrorist Organization (FTO) group and provide a specific example of how the group has demonstrated intent to threaten the United States.
Part Four: Capability of Threat: Describe the primary tactics used by perpetrators in terrorist attacks worldwide in 2019.
Part Five
Targeting 1: Identify the top three primary victims of terrorism incidents worldwide in 2019.
Targeting 2: Using the Global Terrorism Database, summarize the attack types and weapons used against government targets from 2015 – 2019.
Part Six: Data Breaches: Conduct a web search for a significant data breach or cyber-attack against a commercial target. Identify the company, the type of data breach or attack that occurred, and the impact of that breach or attack.
What to Submit
Enter your responses in the Student Responses column of the Module Three Research Activity Worksheet and then submit the worksheet.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
