Explain the potential ramifications of the tactics

Assignment Help Computer Engineering
Reference no: EM133728868

One of the three focus projects for this course is creating a technical brief based on the research you've conducted. The audience for this brief is the security or IT director for the fictional organization for which you work. This technical brief will serve as the basis for a proactive adversarial detection plan that your director will be creating. The final product represents an authentic demonstration of competency because, as a security analyst, you must develop skills that use a variety of methods and tools to detect, characterize, and counter cyber threat actors. Your work will contribute to larger team projects across your organization. This project will also help you develop an important mindset: thinking responsibly and proactively about what threat actors would do to attack organizational assets.
The project incorporates one milestone, which will be submitted in Module Five. The project will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following course competency:

Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors

Scenario
In a course announcement, your instructor will provide some scenarios for you to choose from. In your chosen scenario, you are a security analyst, creating a technical brief for the security or IT director explaining how the situation informs the larger proactive adversarial detection plan they are writing for the organization. The specific technical information, results, or determinations you need are supplied within the scenario. Your brief should address each critical element in the Project Three prompt, discussing your best-practice tactics or methods recommendations based on your research from the decision aid you completed as the milestone for this project. The Conclusion section of this activity requires you to expand on all the research you did for the decision aid.
Prompt
In your technical brief, you must address the critical elements listed below.
I. Introduction
A. Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide or decision aid to support your response. For example, is the threat actor gathering information for financial gain?
II. Analysis
A. Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or decision aid to support your response.
B. Describe ethical and legal factors that should be considered and their significance in terms of the company for which you are employed in the scenario. Use research from the Project Three resource guide or decision aid to support your response.
C. Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three resource guide or decision aid to support your response.
D. Describe at least one tactic or method that would be employed to reduce the likelihood of the same situation happening again. Use research from the Project Three resource guide or decision aid to support your response.
III. Conclusion

A. Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to support your response.

Reference no: EM133728868

Questions Cloud

Family sign to authorize procurement of the organs : What type of consent must Sam's family sign to authorize procurement of the organs? implied consent general consent consent -in-absentia informed consent.
Summarize the individual evidence using the summary table : Summarize the individual evidence using the summary table document attached Use the information from the Research Appraisal Tool to help you complete
What are the implications for the subsequent search : Is the initial traffic stop of John's vehicle lawful, considering the broken taillight, and what are the implications for the subsequent search?
Diagnosed with bipolar disorder : Alice is a female diagnosed with bipolar disorder. Together you decide the best course of treatment is with lurasidone. Y
Explain the potential ramifications of the tactics : Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to support your response
What way are sanctions said to be a form of warfare : In what way are sanctions said to be a form of warfare? How are powerful nations able to use sanctions to pursue a "might is right" policy?
Patient directory the health care facility : Regarding the patient directory the health care facility must: release information as the facility feels necessary inform the patient
Explain how the examples your peers described : Explain how the examples your peers described are similar to your own example. Why you think those elements of leadership and management might be effective?
How would you identify a research project : How would you identify a research project as being an evidence-based intervention project versus the creation of knowledge in a nursing research project

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd