to be spies. They have recruited your company to assist with the decryption of these messages. Instructions Before you start on this mission, both national organizations want to verify your ability to identify the motivation and capabilities behind Cyber terrorism and information warfare. In a 4-5 page (Double Spaced ) report to both organizations, answer the following questions, providing specific details for each topic: APA Referencing Style 12 margin word Explain the developmental perspective on the problem of and changes to cyber victimization. Evaluate two current issues, trends, or problems in cyber crime and cyber terrorism. Analyze the tactics used in cyberspace to share information and promote terrorist ideologies between and within terrorist groups. Explain why inter connectivity is important in today's connected environment. Evaluate the two biggest threats against the national interests of the United States, including critical infrastructure. Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides. This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment is: Distinguish between different types of bad actors in cyberspace, including their resources, capabilities/techniques, motivations, and aversion to risk. LINK FOR NOTES https://research.strayer.edu/