Kean University Cyber Security JBS Cyber Analysis
Description of the cybercrime, cybersecurity incident, hacking, or digital crime activity that took place.
Explanation of how the cyber activity took place, outlining the general path, logic, steps and technologies utilized to carry out the incident. For example, was the attack carried out by internal threat actors familiar with the organization, business, individuals?
Describe what if any protections were in place prior to the event to help prevent the cyber incident. Were the protections adequate?
In your views, outline what steps the attacked organizations, individuals, or business could have taken to help prevent the cyber incident. Was it impossible to prevent? Is there a cyber policy that can have been in place to protect the attacked organization? Why or why not?
Is the type of cyber-attack or incident that took place trending towards increasing or decreasing? Provide actual factual data to back up your claim. Consider referencing the FBI Internet Crime Complain Center (IC3) 2019 report – https://www.ic3.gov/Media/PDF/AnnualReport/2019_IC3Report.pdf
Finally, make a prediction of how you believe Internet or digital related cybercrimes, or cyberattacks activities will evolve over the next 5 years.