For this activity, create a presentation and post it in the discussion thread. F

Cybersecurity Applications in Space

Important - Read this before proceeding

These instructions are based on a task we've worked on previously. If you're looking for an answer to the same assignment, you'll need to submit an order on our writers' platform to receive a unique paper that you can confidently present as your own work. Read our "How It Works" page for more information.

For this activity, create a presentation and post it in the discussion thread. Follow the instructions below:
Choose one of the posted presentations from last module week’s discussion as your target.
Next, choose from among the following adversary types:
Nation-state (very sophisticated)
Organized cybercrime (sophisticated)
Activist/lone hacker (somewhat sophisticated)
Describe who you are and what you are targeting (reference the discussion post). Write one to two paragraphs (100–200 words total) on why you are targeting the chosen system. 
Next, include an argument to your customer about what the potential profit from going after this target might be and how much it might be. Estimation is fine (i.e., the organization’s annual revenue is X, and their systems could likely be ransomed for Y). Include how much time and money you would be willing to spend to compromise the system before abandoning the attack.
Now, evaluate the cybersecurity product:
Research the cybersecurity product the post has chosen to improve its cybersecurity posture.
Mention the product and how it secures the target system. How does the presence of this product impact the cost-benefit of going after the target?
Do not wait until the end of the module week—endeavor to make your initial post as early as possible.
Respond to two classmates’ presentations by choosing a different type of malicious actor than the presenter did, and explain why they might be motivated to attack the target system.