CYB 200 Project Three Milestone Decision Aid Template
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
200
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
8
Uploaded by ISSIT_Learn
CYB 200 Project Three Milestone Decision Aid Template
Complete the template by filling in the blank cells provided.
I.
Detection
1. Describe the following best practices or methods for detecting a threat actor.
Awareness
The understanding of the current security risk posture within the organization. It can also mean the process of teaching users about security objectives, the current threats and trends, and to motivate users to comply with the stated security policies. Auditing
The process of evaluating devices and software to avoid data breaches by checking how their operation meets your security goals. It is used to detect abnormal behavior. Monitoring
Reviewing and measuring all security controls to capture actions and changes on systems. Collecting information from network sensors to identify patterns that indicate a potential threat or security incident.
Testing
The testing of systems, networks, and software programs to sse how secure they are and to see if they can withstand an attack from a person with bad intent. Sandboxing
Offers a monitored and controlled environment where unknown software cannot cause harm to the real hosting computer.
Citations:
Amoroso, Edward.
Cyber Attacks : Protecting National Infrastructure
, Elsevier Science & Technology, 2010.
ProQuest Ebook Central
, https://ebookcentral-proquest-com.ezproxy.snhu.edu/lib/snhu-ebooks/
detail.action?docID=610561.
Cebula, James L., and Lisa R. Young.
A taxonomy of operational cyber security risks
. Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst, 2010.
Hoopes, John, and John Hoopes.
Virtualization for Security : Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
, Elsevier Science & Technology Books, 2008.
ProQuest Ebook Central
, https://ebookcentral-proquest-com.ezproxy.snhu.edu/lib/snhu-ebooks/
detail.action?docID=421177
.
Kim, David, and Michael Solomon.
Fundamentals of Information Systems Security
. 3rd ed., Jones & Bartlett
Learning, 2016.
Lord, Nate. “What Is Threat Monitoring?”
Digital Guardian
, 29 Sept. 2020, https://digitalguardian.com/blog/what-threat-monitoring.
II.
Characterization
2. Briefly define the following threat actors.
Individuals
who are
“shoulder
surfers”
A person who looks over the shoulder of other people who are typing into a computer screen.
Individuals
who do not
follow policy
An insider is a serious threat actor that comes from within an organization, a contractor, or a business partner. This person could be a disgruntled employee looking to get financial
gain from selling information or an employee looking to conceal information through fake transactions.
Individuals
using others’
credentials
Individuals
who tailgate
Individuals who follow other individuals so close that they can sneak past a secure door or access area.
Individuals
who steal
assets from
company
property
Citations:
Kim, David, and Michael Solomon.
Fundamentals of Information Systems Security
. 3rd ed., Jones & Bartlett
Learning, 2016.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Physical Security Survey
In this project you will perform a survey of the physical security at your school or workplace.
Identify vulnerabilities in the design and use of the following aspects of the facility:
Use of locking doors at main entrances
Access to sensitive areas
Cabling, communications, or computing equipment readily accessible
Video surveillance
Personnel badges
Loading area
Fire suppression
Make a list of issues you found. Include a categorization of risk and a suggested remedy to reduce the risk.
Do not enter any “employee only” areas during this exercise unless you have obtained permission in advance or are escorted by authorized personnel
arrow_forward
Title: Ransomware Attack and Prevention Strategies
Objective: The objective of this assignment is to research and propose prevention strategies for ransomware attacks, which have become a growing threat to individuals, organizations, and even governments.
Task:
Provide an overview of what ransomware attack are, including how they work and the motivation behind them. Present real-life examples of notable ransomware attacks and their impact on various entities. Explain the common vectors through which ransomware is delivered, such as phishing emails, malicious downloads, and vulnerabilities in software.
Present a range of preventive measures that individuals and organizations can take to minimize the risk of ransomware attacks. This could include regular software updates, employee training, and endpoint security solutions.
arrow_forward
Software Security
Identify whether their organization uses critical software which is exposed to possible external attack. This would most likely be software running on an externally visible web server to handle responses to forms or other dynamic data handling. You should check what version of software is being used, what the most current version available is, and match this with any reports of known vulnerabilities in this software, as provided by organizations such as CERT, CIO, NIST/NSA, SANS etc. You should detail the threat posed to the organization by any known vulnerabilities, and whether you would recommend this software be upgraded, or hardened in some manner.
arrow_forward
What is the ultimate goal of incident response?
Question 8 options:
Mitigate the damage
Secure the database
Minimize the damage
Eliminate the threat
arrow_forward
There are various enacted statutes or laws that address different aspects of cybersecurity.
1.) What piece of legislation (law) do you think has been most impactful in this realm and why? Be sure to give the name of a state or federal statute (law), a brief description discussing its purpose, and how it has impacted cybersecurity from a legal perspective.
arrow_forward
SALESFORCE Richard Bresnan is working on his Space tour program. His team is working on Salesforce to make reports for listing the potential threats that he may face. After completing the report his handed over to Bresnan but he is unable to select it from the Report type list. What is causing this problem?
arrow_forward
Step-By-Step Assignment Instructions
Assignment Topic:
How data breaches occur and are discovered.
Setup instructions:
Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches.
Then pick 3 different types of data breaches and report on one data breach each. The types are located on the left hand side.
How to submit:
Submit a summary of each data breach and answer the following questions in your response:
What was the data breach?
How was the data breach found out?
What were the threats?
What were the vulnerabilities and how did the threats interact with them?
Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach?
Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page. In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.
arrow_forward
Research three (3) computer or security solutions that are available to purchase.Post:
The name and reference for the solution:
The details on what threats the solution should mitigate and how the solution addresses them..
References to any validations to their claims.
What security issue the solution does not address and what would be required to augment the solution to meet this problem
arrow_forward
C: Emotet Breach
Details (What it affects):
How to eliminate it:
arrow_forward
Question::
Case Exercises Amy walked into her office cubicle and sat down. The entire episode with
the blond man had taken well over two hours of her day. Plus, the police officers had told
her the district attorney would also be calling to make an appointment to speak to her,
which meant she would have to spend even more time dealing with this incident. She
hoped her manager would understand.
Questions:
1. Based on this case study, what security awareness and training documents and
posters had an impact in this event?
2. Do you think that Amy should have done anything differently? What would you have
done in the situation in which she found herself?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Physical Security Survey In this project you will perform a survey of the physical security at your school or workplace. Identify vulnerabilities in the design and use of the following aspects of the facility: Use of locking doors at main entrances Access to sensitive areas Cabling, communications, or computing equipment readily accessible Video surveillance Personnel badges Loading area Fire suppression Make a list of issues you found. Include a categorization of risk and a suggested remedy to reduce the risk. Do not enter any “employee only” areas during this exercise unless you have obtained permission in advance or are escorted by authorized personnelarrow_forwardTitle: Ransomware Attack and Prevention Strategies Objective: The objective of this assignment is to research and propose prevention strategies for ransomware attacks, which have become a growing threat to individuals, organizations, and even governments. Task: Provide an overview of what ransomware attack are, including how they work and the motivation behind them. Present real-life examples of notable ransomware attacks and their impact on various entities. Explain the common vectors through which ransomware is delivered, such as phishing emails, malicious downloads, and vulnerabilities in software. Present a range of preventive measures that individuals and organizations can take to minimize the risk of ransomware attacks. This could include regular software updates, employee training, and endpoint security solutions.arrow_forwardSoftware Security Identify whether their organization uses critical software which is exposed to possible external attack. This would most likely be software running on an externally visible web server to handle responses to forms or other dynamic data handling. You should check what version of software is being used, what the most current version available is, and match this with any reports of known vulnerabilities in this software, as provided by organizations such as CERT, CIO, NIST/NSA, SANS etc. You should detail the threat posed to the organization by any known vulnerabilities, and whether you would recommend this software be upgraded, or hardened in some manner.arrow_forward
- What is the ultimate goal of incident response? Question 8 options: Mitigate the damage Secure the database Minimize the damage Eliminate the threatarrow_forwardThere are various enacted statutes or laws that address different aspects of cybersecurity. 1.) What piece of legislation (law) do you think has been most impactful in this realm and why? Be sure to give the name of a state or federal statute (law), a brief description discussing its purpose, and how it has impacted cybersecurity from a legal perspective.arrow_forwardSALESFORCE Richard Bresnan is working on his Space tour program. His team is working on Salesforce to make reports for listing the potential threats that he may face. After completing the report his handed over to Bresnan but he is unable to select it from the Report type list. What is causing this problem?arrow_forward
- Step-By-Step Assignment Instructions Assignment Topic: How data breaches occur and are discovered. Setup instructions: Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches. Then pick 3 different types of data breaches and report on one data breach each. The types are located on the left hand side. How to submit: Submit a summary of each data breach and answer the following questions in your response: What was the data breach? How was the data breach found out? What were the threats? What were the vulnerabilities and how did the threats interact with them? Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach? Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page. In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.arrow_forwardResearch three (3) computer or security solutions that are available to purchase.Post: The name and reference for the solution: The details on what threats the solution should mitigate and how the solution addresses them.. References to any validations to their claims. What security issue the solution does not address and what would be required to augment the solution to meet this problemarrow_forwardC: Emotet Breach Details (What it affects): How to eliminate it:arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Information Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning