Question
i)The MITRE attack framework is used to mitigating and detecting APT techniques. For a scenario where the adversary is trying to gather information they can
i)The MITRE attack framework is used to mitigating and detecting APT techniques. For a scenario where the adversary is trying to gather information they can use to plan future operations, Reconnaissance, name and describe three techniques used by adversaries to scope and plan their compromise.
ii) Ransomware has evolved heavily over the past few years to include several new network exploits, including modified polymorphic front end, and zero-day worm propagation techniques. Identify and explain two configurations for defending networks against ransomware exploits.
iii) What is meant by network resilience' and why is it important?
-write the answer by the keyboard-
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started