This research activity will help you use resources and databases to collect the data that you need to analyze security concerns.
There are common tactical methods used by terrorist organizations (political, religious, ethnic, and ideological). During the threat assessment process, it is important to determine which weapons and tactics a threat actor could use against a critical infrastructure sector or key asset.
The key to threat assessment is collecting objective, valid, and relevant intelligence information (data collection) about the activities of potential threat actors.
All risk analysis is based on gathering the right data to make informed decisions and to recommend appropriate countermeasures. Significant security concerns to critical infrastructure are the existence of threats, history of threats, intention of threat, capability of threat and targeting.
The goal for this activity is to explore key resources, locate specific data, and address threat assessment questions related to each of these security concerns.
Prompt
Use the Module Three Research Activity Worksheet to complete this assignment. Specifically, the following critical elements must be addressed:
Part One: Existence of Threat: Identify the jurisdictions (locations) where the Animal Liberation Front has conducted attacks.
Part Two
History of Threat
Identify the total number of attacks.
Identify whether the greatest threat was from groups or lone actors.
Describe the method of attacks.
Part Three: Intention of Threat: Choose one Foreign Terrorist Organization (FTO) group and provide a specific example of how the group has demonstrated intent to threaten the United States.
Part Four: Capability of Threat: Describe the primary tactics used by perpetrators in terrorist attacks worldwide in 2019.
Part Five
Targeting 1: Identify the top three primary victims of terrorism incidents worldwide in 2019.
Targeting 2: Using the Global Terrorism Database, summarize the attack types and weapons used against government targets from 2015 – 2019.
Part Six: Data Breaches: Conduct a web search for a significant data breach or cyber-attack against a commercial target. Identify the company, the type of data breach or attack that occurred, and the impact of that breach or attack.
What to Submit
Enter your responses in the Student Responses column of the Module Three Research Activity Worksheet and then submit the worksheet.