Overview: As a professional in the field of cybersecurity, you should be aware of best-practice tactics and methods necessary for responding to a variety of cyber threat actors. For this activity, you will research and determine factors to detect, characterize, and counter a range of threat actor situations to place into a decision aid template. This milestone will prepare you to think proactively and ethically in terms of what threat actors would do to attack organizational assets. You can find the resources guide for this milestone in the Reading and Resources area of Module Five. Be thorough in completing the decision aid. Upon completion, this is a recommended artifact for your cyber playbook and will be tagged with the Human Security icon. You may use the Decision Aid Template or a blank Word document to address the critical elements for the Project Three Milestone. This decision aid will inform your technical brief in Project Three, which will be based on a scenario your instructor provides in the Project Three announcement. You will not use all the tactics and methods you researched, but rather choose and refine your answers based on the specific situation. Prompt: In your decision aid, address the critical elements listed below. I. Detection A. Describe at least seven best practices or methods for detecting a threat actor specific to the categories in the decision aid template. Use research from the resource guide to support your responses. II. Characterization A. Define at least five types of threat actors specific to the categories in the decision aid template. Use research from the resource guide to support your responses. B. Describe at least four motivations or desired outcomes of threat actors specific to the categories in the decision aid template. Use research from the resource guide to support your responses. C. Identify the company assets of at least seven types of institutions that may be at risk from a threat actor specific to the categories in the decision aid template. Use research from the resource guide to support your responses. III. Response A. Describe at least three potential counterstrategies or tactics that you might use to respond to and counter a threat actor (reactive approach). Use research from the resource guide to support your responses. B. Describe at least three potential strategies or tactics that you would employ to reduce the likelihood of the same situation happening again (proactive approach). Use research from the resource guide to support your responses. C. Explain your reason for determining the threat actor you chose (Response: Parts A and B) and justify your strategies to both proactively and reactively respond to that type of threat actor. Cite your sources according to APA style. Please try your best to keep it on the formate.
CYB 200 Project Three Milestone Decision Aid Template
Complete the template by filling in the blank cells provided.
Detection
1. Describe the following best practices or methods for detecting a threat actor.
Awareness
Auditing
Monitoring
Testing
Sandboxing
Citations:
Characterization
2. Briefly define the following threat actors.
Individuals who are “shoulder surfers”
Individuals who do not follow policy
Individuals using others’ credentials
Individuals who tailgate
Individuals who steal assets from company property
Citations:
3. Describe the following motivations or desired outcomes of threat actors.
Fraud
Sabotage
Vandalism
Theft
Citations:
4. Identify the company assets that may be at risk from a threat actor for the following types of institutions.
Remember: Each company will react differently in terms of the type of assets it is trying to protect.
Financial
Medical
Educational
Government
Retail
Pharmaceutical
Entertainment
Citations:
Response
Choose a threat actor from Question 2 to research for the response section of the decision aid:
Threat Actor
5. Describe three potential strategies or tactics that you would use to respond to and counter the threat actor you chose.
Hint: What are the best practices for reacting to this type of threat actor?
Strategy 1
Strategy 2
Strategy 3
Citations:
6. Describe three potential strategies or tactics that you would employ to reduce the likelihood of a similar threat occurring again.
Hint: What are the best practices for proactively responding to this type of threat actor?
Strategy 1
Strategy 2
Strategy 3
Citations:
7. Explain your reason for determining the threat actor you chose to research. Why are the strategies you identified appropriate for responding to this threat actor? Justify your tactics to proactively and reactively respond to this threat actor.
Overview: As a professional in the field of cybersecurity, you should be aware of best-practice tactics and methods nece
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am