Pick a Cyber Conflict, Cyber Espionage or Cyber Terrorism study from the supplied list and examine it in detail. In your case study detail the chronology of the incident, the threat actor or suspected threat actor, motives, target, technical means and non-cyber aspects. Detail the victim organisation/s response including what worked well and what did not. Suggest how the victim organisation/s could have been better prepared, detected the event earlier and responded more effectively. Byzantine Hades 2003 Edward Snowden 2013 Belgacom 2011-2013 Rio Tinto 2009 Wannacry 2017 Shamoon 2012 Ardit Ferizi 2015 2000 word