Question
In previous modules, you studied different types of cyber attacks, and you have looked at threat modeling using the Howard Threat Model, which is a
In previous modules, you studied different types of cyber attacks, and you have looked at threat modeling using the Howard Threat Model, which is a small process that exists under the topic of cybersecurity. Tools like the Lockheed Martin Cyber Kill Chain can also be used to help extend threat modeling into incident handling. Discuss the use of tools like the Cyber Kill Chain to handle incident response for emerging technologies.
In response to your peers, discuss the possible gaps left by using a tool such as one described in their initial posts
Need a Response Please!!!!
Mark Guerrero
With the growing of emerging technologies whether they are new or existing ones the use of a Cyber Kill Chain tool is becoming prevalent when handling incident responses. Case in point, the growth of working remotely has made security a bigger issue. Especially so with threat actors searching for weak points in a network to exploit. The easiest way to compromise a network is through the network's endpoints thus making endpoint security essential. Using an endpoint protection (EPP) can help detect and mitigate stages of the cyber kill chain. An EPP is a suite that combines multiple layers of antivirus, data encryption, and data loss prevention all working together to detect and prevent attacks (Choice, 2022).
-Mark
References
Choice, E. (2022, December 1). The importance of endpoint security in breaking the cyber kill chain. Information Age. https://www.information-age.com/importance-endpoint-security-breaking-cyber-kill-chain-17852/
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started