Anna Shields, Daniel Kapit, Mahitosh Patel, Julia Pennington, Sean Bae
There will be a relationship between IP location and the method of hack.
There will be a relationship between IP location and the files they download (which will be labeled in different languages)
Determine if there is another way to track the location of hackers other than IP
Since IP addresses can be spoofed and covered it is important that a new way to locate hackers is developed so that hacks can be accurately attributed to a group or country.
Threat
Vulnerability
Information Asset
Risk