As you continue to investigate the company for vulnerabilities in order to help them develop a culture of security, you need to get into the mind of a hacker to attempt to understand how they think, why they do what they do, what motivates them that would especially make this company vulnerable, and how they communicate with other hackers to coordinate attacks. Using the template design profiles of hackers, both digital and social engineers, as well as those that do it to steal intellectual property and those that hack for revenge or to cause disruption in a business, such as environmental groups. These profiles will help you in working with the company’s employees to understand the risks. Elements Exceeds Competency 90 – 100 Mechanics (15%) Grammar, spelling, sentence structure; Cite sources in APA format from reputable reference materials All work is in APA format with appropriately cited sources; no grammar or spelling errors. Uses complete sentences, well formed paragraphs, and graduate level word usage and complex sentence structure. Includes appropriate tables/graphs/charts Reconnaissance (45%) Conducts a thorough reconnaissance of a company to determine how easy it would be for a social engineer to gain access. Submits a detailed report on what steps were taken during the reconnaissance. Provides links and other supporting documentation from reliable sources. Profiles (40%) Using the template designs profiles of over 5 different types of hackers, both digital and social engineers, as well as those that do it to steal intellectual property and those that hack for revenge or to cause disruption in a business, such as environmental groups. Provides well-supported documentation for the profiles from reliable sources.Read Chapter 1 – Psychological and Cultural Trends in Blackhatonomics: An Inside Look at the Economics of Cybercrime.