Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Include the problem statement from the previous deliverable for reference. Describe how a threat actor can utilize malware to breach the organizations security to exfiltrate

  • Include the problem statement from the previous deliverable for reference.
  • Describe how a threat actor can utilize malware to breach the organizations security to exfiltrate critical data assets. Use external resources from open-source intelligence (OSINT) to justify your claim.
  • Propose two effective security controls against malware-based attacks and ways to monitor and assess the effectiveness of the security controls.
  • For each proposed security control considered, provide a qualitative (descriptive) analysis of its operation, availability, cost, implementation issues, and overall benefit to the company.
  • Provide a high-level flow diagram like the Microsoft Security Development Lifecycle (SDL) that shows how the implementation of DevSecOps can mitigate risks to the organizations computing resources. See Appendix A for more information.

Problem statement:

Microsoft should use a more proactive approach in defense of security threats rather than a reactive approach. This will allow the security professionals to identify and remove threats prior to them happening.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management

Authors: Richard L. Daft

12th edition

978-1118582695, 1118582691, 9781118801277, 111880127X, 978-1285861982

More Books

Students also viewed these General Management questions