For this assignment, you will have to do a lot of research and be very careful about how you conduct this assessment. You are not allowed to use any method that would be considered in violation of applicable laws and statutes regarding integrity and ownership of data and information systems.RequirementsIn a written report to your C-suite executives address the following:
- Identify the business sector you are assessing (e.g., Medical, Energy, Telecommunications, etc.).
- Identify the information on the leadership of the company.
- Who is the CEO, CTO, CISO, CIO, CFO, etc.
- Explain why you consider them a direct competitor.
- Are they bringing to market something that competes directly with a product your company deals with?
- Explain the viability of the threat.
- Take a look at the SEC filings, stock prices, IPO, etc.
- Get a sense of whether they are bringing disruptive technology into the marketplace.
- Does the benefit outweigh the cost of the resources necessary to conduct an attack?
Rules of Engagement
- The adversary must be an actual company or organization.
- You are not allowed to ‘hack’ the company to gain your intelligence.
- You must be able to document that everything you learned was done through Open Source Intelligence (OSINT) gathering. That means the information has to be verified as publicly accessible.
- You must leave no trace. Your actions should not be able to be attributed to you.
Your report can be organized and formatted in any manner you think best answers the questions and that will be most effectively interpreted by your audience (C-suite executives). It must be succinct and to the point and be no longer than four (4) pages in length, not including your title and reference pages. Refer to the readings and presentations from this module to inform the way in which you analyze the problem. This report will further inform your final project proposal which will be due at the end of Module 7. Remember to use APA formatting.