CYB 200 Project Three Milestone Decision Aid Template

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

8

Uploaded by ISSIT_Learn

Report
CYB 200 Project Three Milestone Decision Aid Template Complete the template by filling in the blank cells provided. I. Detection 1. Describe the following best practices or methods for detecting a threat actor. Awareness The understanding of the current security risk posture within the organization. It can also mean the process of teaching users about security objectives, the current threats and trends, and to motivate users to comply with the stated security policies. Auditing The process of evaluating devices and software to avoid data breaches by checking how their operation meets your security goals. It is used to detect abnormal behavior. Monitoring Reviewing and measuring all security controls to capture actions and changes on systems. Collecting information from network sensors to identify patterns that indicate a potential threat or security incident. Testing The testing of systems, networks, and software programs to sse how secure they are and to see if they can withstand an attack from a person with bad intent. Sandboxing Offers a monitored and controlled environment where unknown software cannot cause harm to the real hosting computer.
Citations: Amoroso, Edward.   Cyber Attacks : Protecting National Infrastructure , Elsevier Science & Technology, 2010.   ProQuest Ebook Central , https://ebookcentral-proquest-com.ezproxy.snhu.edu/lib/snhu-ebooks/ detail.action?docID=610561. Cebula, James L., and Lisa R. Young.   A taxonomy of operational cyber security risks . Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst, 2010. Hoopes, John, and John Hoopes.   Virtualization for Security : Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting , Elsevier Science & Technology Books, 2008.   ProQuest Ebook Central , https://ebookcentral-proquest-com.ezproxy.snhu.edu/lib/snhu-ebooks/ detail.action?docID=421177 . Kim, David, and Michael Solomon.  Fundamentals of Information Systems Security . 3rd ed., Jones & Bartlett Learning, 2016.  Lord, Nate. “What Is Threat Monitoring?”  Digital Guardian , 29 Sept. 2020, https://digitalguardian.com/blog/what-threat-monitoring. 
II. Characterization 2. Briefly define the following threat actors. Individuals who are “shoulder surfers” A person who looks over the shoulder of other people who are typing into a computer screen. Individuals who do not follow policy An insider is a serious threat actor that comes from within an organization, a contractor, or a business partner. This person could be a disgruntled employee looking to get financial gain from selling information or an employee looking to conceal information through fake transactions. Individuals using others’ credentials Individuals who tailgate Individuals who follow other individuals so close that they can sneak past a secure door or access area. Individuals who steal assets from company property Citations: Kim, David, and Michael Solomon.  Fundamentals of Information Systems Security . 3rd ed., Jones & Bartlett Learning, 2016. 
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help