CYB_200_Project_Three_Milestone_Owen_Capak

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by BailiffYakMaster294

Report
CYB 200 Project Two Milestone Decision Aid Template Complete the template by filling in the blank cells provided. I. Detection 1. Describe the following best practices or methods for detecting a threat actor. Awareness Promoting cybersecurity awareness among employees to recognize and report suspicious activities. Auditing Conducting regular audits of systems, networks, and logs to identify anomalies and potential security breaches. Diligence Encouraging employees to remain vigilant and cautious when handling sensitive information or interacting with unknown sources. Monitoring Implementing continuous monitoring solutions to track network traffic, system activities, and user behavior for signs of compromise. Testing Performing regular penetration testing and vulnerability assessments to identify and address security weaknesses. Sandboxing Employing sandbox environments to safely analyze and test suspicious files, applications, or activities. Enticing Creating honeypots or decoy systems to lure and identify potential attackers. Citations:
II. Characterization 2. Briefly define the following threat actors. Individuals who are “shoulder surfers” Threat actors who attempt to gain unauthorized access or steal sensitive information by observing or eavesdropping on individuals' screens or activities in public places. Individuals who do not follow policy Threat actors who knowingly or unknowingly violate organizational security policies and procedures, increasing the risk of security incidents and breaches. Individuals using others’ credentials Threat actors who impersonate legitimate users by obtaining or stealing their credentials to gain unauthorized access to systems, networks, or data. Individuals who tailgate Threat actors who exploit physical security weaknesses by following authorized individuals into restricted areas without proper authentication or authorization. Individuals who steal assets from company property Threat actors who unlawfully remove or misappropriate physical assets, equipment, or resources belonging to the organization. Citations:
3. Describe the following motivations or desired outcomes of threat actors. Fraud Threat actors seek financial gain through fraudulent activities such as identity theft, credit card fraud, or financial scams. Sabotage Threat actors aim to disrupt or damage organizational operations, infrastructure, or reputation through deliberate acts of sabotage. Vandalism Threat actors engage in malicious activities to deface websites, vandalize digital assets, or spread destructive malware. Theft Threat actors steal sensitive information, intellectual property, or valuable assets for financial gain or competitive advantage. Citations:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help