CYB_200_Project_Three_Milestone_Owen_Capak
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
200
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
7
Uploaded by BailiffYakMaster294
CYB 200 Project Two Milestone Decision Aid Template
Complete the template by filling in the blank cells provided.
I.
Detection
1. Describe the following best practices or methods for detecting a threat actor.
Awareness
Promoting cybersecurity awareness among employees to recognize and report suspicious activities.
Auditing
Conducting regular audits of systems, networks, and logs to identify anomalies and potential
security breaches.
Diligence
Encouraging employees to remain vigilant and cautious when handling sensitive information
or interacting with unknown sources.
Monitoring
Implementing continuous monitoring solutions to track network traffic, system activities, and user behavior for signs of compromise.
Testing
Performing regular penetration testing and vulnerability assessments to identify and address security weaknesses.
Sandboxing
Employing sandbox environments to safely analyze and test suspicious files, applications, or activities.
Enticing
Creating honeypots or decoy systems to lure and identify potential attackers.
Citations:
II.
Characterization
2. Briefly define the following threat actors.
Individuals
who are
“shoulder
surfers”
Threat actors who attempt to gain unauthorized access or steal sensitive information by observing or eavesdropping on individuals' screens or activities in public places.
Individuals
who do not
follow policy
Threat actors who knowingly or unknowingly violate organizational security policies and procedures, increasing the risk of security incidents and breaches.
Individuals
using others’
credentials
Threat actors who impersonate legitimate users by obtaining or stealing their credentials to gain unauthorized access to systems, networks, or data.
Individuals
who tailgate
Threat actors who exploit physical security weaknesses by following authorized individuals
into restricted areas without proper authentication or authorization.
Individuals
who steal
assets from
company
property
Threat actors who unlawfully remove or misappropriate physical assets, equipment, or resources belonging to the organization.
Citations:
3. Describe the following motivations or desired outcomes of threat actors.
Fraud
Threat actors seek financial gain through fraudulent activities such as identity theft, credit card fraud, or financial scams.
Sabotage
Threat actors aim to disrupt or damage organizational operations, infrastructure, or reputation through deliberate acts of sabotage.
Vandalism
Threat actors engage in malicious activities to deface websites, vandalize digital assets, or spread destructive malware.
Theft
Threat actors steal sensitive information, intellectual property, or valuable assets for financial gain or competitive advantage.
Citations:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help