Threat Analysis and Exploitation
Step 5: The Intelligence Community
(Joyce) Part 1: To be completed by all team members: Provide an overview of the life cycle of a cyberthreat. Explain the different threat vectors that cyber actors use and provide a possible list of nation-state actors that have targeted the US financial services industry before.
Review this threat response and recovery resource and use what you learn to propose an analytical method in which you are able to detect the threat, identify the threat, and perform threat response and recovery. Identify the stage of the cyberthreat life cycle where you would observe different threat behaviors. Include ways to defend and protect against the threat. Provide this information in your SAR and AAR. Ensure that the information is appropriately cited.
The project is divided into three parts, the SAR, the AAR, and a PowerPoint presentation (see below). Each student would produce a 2 page SAR portion, a 2 page AAR portion, and contribute to a slide in the presentation for the same topic


0 comments