Chat with us, powered by LiveChat

Identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.

Words: 261
Pages: 1
Subject: IT & Technology

Description

C-Suite Presentation

Assessment Description

You have recently accepted a new position at a large hospital that specializes in critical care of cancer patients. Your supervisor, the CIO, has requested you create and present to upper-level management (C-Suite: CEO, CFO, CSO, etc.) a presentation on the various actors your organization may face in the near future. The CIO impresses upon you the need for additional funding to secure key systems in the network but cautions you against creating a state of panic as none of those attending have a deep understanding of cybersecurity.

Create a presentation/ report for upper-level management that explains the possible threats. Address the following. Please include a Title Page, Outline, Overview, Summary and References:

• Research and identify the various threat actors of the digital world to include: APTs, cyberterrorism, script kiddies, cybercriminals, hacktivists, and insider threats. (Be sure to include these threats; it’s not optional)

• Prioritize which threat actors would pose the greatest threat.

• Utilizing the article “The Role of the Adversary Model in Applied Security Research,” which is attached, include an adversary model to compare and contract each threat actor. Include assumptions, goals, capabilities, favored techniques, and aversion to risk.

• Identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.

 

Additionally, include graphics that are relevant to the content and visually appealing

“The Role of the Adversary Model in Applied Security Research” is attached.

SUPPORT YOUR REPORT WITH 3-5 SCHOLARLY RESOURCES.

***PLEASE INCLUDE CLEAR AND DETAILED INFORMATION ADDRESSING EACH OF THE FOUR POINTS LISTED ABOVE***