• Home
  • Blog
  • Good afteroon, Below is the writting assisgment that is due, were I have found

Good afteroon, Below is the writting assisgment that is due, were I have found

0 comments

ORDER YOUR PAPER AND GET QUALITY FOR YOUR MONEY

Good afteroon,Below is the writting assisgment that is due, were I have found the answers (but I have included the link for you to be able to refrence) however, I am having a problem formatting it and building it into an formal essay. It is instructed to to be in APA format, 500 words, and include intext refrences and a refrence sheet.1. What is the order of threat actors along the Cyber threat spectrum from least to most sophisticated? Pg 22Cyber threat is characterized in terms of three classes of increasing sophistication: those practitioners who rely on others to develop the malicious code (Tiers I-II, Nuisance) those who can develop their own tools to exploit publicly known vulnerabilities as well as discover new vulnerabilities (Tier III-IV), and those who have significant resources and can dedicate them to creating vulnerabilities in systems (Tier V-VI, Existential). The threat actors are further explained through each designated tier.– Tier 1 Practitioners who rely on others to develop the malicious code, delivery mechanisms, and execution strategy. Use known exploits commonly referred to as “script kiddies”Tier II Practitioners with a greater depth of experience, with the ability to develop their own tools from publicly known VulnerabilitiesTier III Practitioners who focus on the discovery and use of unknown malicious code, are adept at installing user and kernel mode root kits, frequently use data mining tools, and target corporate data with the expressed purpose of selling the information to other criminal elements. **The major distinction between Tiers III and IV is scale. Tier IV is characterized by larger more organized teams, either state or criminal.Tier IV are criminal or state actors who are organized, highly technical, proficient, well-funded professionals working in teams to discover new vulnerabilities and desktop exploits.Tier V are State actors who create actors through influence commercial products and services during design and development or manufacturing or with the ability to impact products while in the supply chain to enable exploitation of networks and systems of interest.– Tier V and VI encompass actors who can go beyond malicious software inserted through internet access and instead create vulnerabilities in otherwise well-protected systems,Tier VI States with the ability to successfully execute full spectrum operations to achieve a specific outcome and apply at scale (Table 2.1, Description of Threat Tiers).2. Aside from threat, what are the other components of Cyber risk? Pg 6Now that we understand what a cyber threat is, we must know that they don’t act alone. Aside from cyber threat their components that accompany with cyber risk, vulnerabilities, and consequences.The components of cyber risk (Figure ES. 2) are threats, vulnerabilities of the systems you need to protect, and consequences of losing the systems. The threat broke into two categories: adversary intent and their capabilities. Vulnerabilities are described as either inherent or operationally introduced, and consequences either fixable or fixable or fatal to the impacted systems. (Pg.6)https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-081.pdf (refrence where questions 1&2 answers came from)3. How do individuals within an enterprise, as well as other enterprises with which it interacts (partners, vendors), contribute to an enterprise’s Cyber risk (insider threat)?Individuals within an enterprise as well as other enterprises in which it interacts with contribute to cyber risk by the having access to the organization’s assets such as people, information, technology, and facilities. Then intentionally or unintentionally committing fraud, theft of intellectual property, cyber sabotage, espionage, workplace violence, social engineering, (accidental) disclosure of confidential information, loss or disposal of equipment or documents. Thus, resulting in a negative effect on the organization and its reputation, its employees, degradation of confidentiality, integrity, or availability of information systems.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}