Wilmington University Responding to Cyber Threat Paper

Description

Having Trouble Meeting Your Deadline?

Get your assignment on Wilmington University Responding to Cyber Threat Paper  completed on time. avoid delay and – ORDER NOW

According to DHS “Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. This access can be directed from within an organization by trusted users or from remote locations by unknown persons using the Internet. Threats to control systems can come from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and malicious intruders. To protect against these threats, it is necessary to create a secure cyber-barrier around the Industrial Control System (ICS).”

After reading the articles/papers posted to this module, write a short paper (following the guidelines in the syllabus) focusing on one cyber threat including the following:

  • Discuss why it is a threat, who/what is it targeting
  • Who would behind the threat
  • What would be the result if the threat became an attack
  • What countermeasures can be applied/taken.
  • Advanced Vulnerability Assessment

    “A Vulnerability assessments (VA) is the process of identifying, quantifying, and prioritising (or ranking) all the vulnerabilities in a system. During testing, the vulnerabilities detected are not exploited.” ~PWCAdvance Vulnerability assessment uses a combination of tools, strategies, and threat modeling.

    • Review PASTA, recall your lessons learned from the security tools you have used and methods used to conduct OSINT.
    • Read posted articles/papers

    Write a short paper (following the guidelines in the the syllabus) that discusses an Advanced Vulnerability Assessment for an Enterprises. Including a background of vertical you chose (Healthcare, Finance, etc) and what cyber threats they face. Discuss the framework you would suggest for an Advanced Vulnerability Assessment in their environment and what impact the different facets would make on the enterprise. Make sure to include time /frequency the parts of the assessment should be executed.

Order Solution Now

Similar Posts