A cybersecurity team is noticing unusual external activity on its network. Your

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

A cybersecurity team is noticing unusual external activity on its network. Your role is to examine the network traffic to understand whether your organization was under a cyberattack or if there was an alternative explanation. What do you do?
In your reconnaissance report for the assignment in Module 1, you identified some publicly available data that would be advantageous for an attacker when gathering information on an organization. The data might have told you about their browsers, hardware, and other resources that they use.
Using these data, craft an initial post that details:
If you were a malicious hacker, how would you move to the next phase of the kill chain, weaponization?
What security controls, browser versions, and publicly available information can you leverage to gain illicit access?
All scenarios are deemed hypothetical, and you can utilize various options when choosing a control if they are feasible in real-world applications.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now


Posted

in

by

Tags: