Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Digital communication between computers and across networks can be alluring to adversaries. It may provide them with an entry point to snoop, sniff packets, or

Digital communication between computers and across networks can be alluring to adversaries. It may provide them with an entry point to snoop, sniff packets, or gather information for use in an attack. It is imperative to contemplate adversary activity and model potential threats that can impact your security.For this activity, assume you manage payments for your company and have very important communications that you must initiate every day in a secure manner to facilitate and verify those transactions.Youve received a notification from Brad, the companys senior threat intelligence analyst. He mentions that there are several threat actors that have been actively trying to break into your company. His report cites recent activity targeting your company, which is attributed to the following actors:Carbanak Crimeware GroupGamaredon APT GroupA nation-state group (hes unsure which one)Hes also noticed several commodity-level attacks that he attributes to script kiddie activity. Hes not very concerned about that, but hes keeping an eye on it. In order to protect your company and ensure that you do not become a victim of the attackers, you decide to work with Brad to assess and model the threat.Conduct research on the three threat groups listed above. Assess the threats and model the potential attacks that each group might attempt against your environment. Provide an informed posting based on your research that answers the following and share your findings:What did you find based on your research and threat modeling?What conclusions did you come to? Which threat group poses the highest threat risk to the company, and why?How can you best protect your environment?What discrete steps can you take to secure communications and bolster your defenses?Suppose the adversary controls your router, what are the issues with this?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions