CYB_200_Project_Threel.docx (1) 7-1 Project Three- Scenario One Southern New Hampshire U
- From Economics, General Economics
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10
CYB_200_Project_Threel.docx (1) 7-1 Project Three- Scenario One Southern New Hampshire University Abstract Our scenario is as follows: As a cybersecurity student taking classes at your local university, your English professor posted grades on a printed report from the grading system containing students™ Personally Identifiable Information (PII). Using this scenario we will provide a technical brief and address the following: identify the threat actors, practices or methods for detecting the threat actors, and provide tactics or methods with the ramifications of these tactics or methods. Introduction When looking at the scenario, we first must identify our threat actors. According to Margaret Rouse (2016), a threat actor, also called a malicious actor or bad actor, is an entity that is partially or wholly responsible for an incident that impacts - or has the potential to impact - an organization's security (para.1). For this scenario we will be using SentinelOne™s different threat actors and looking at their definitions. From their definitions, we are looking at an insider threat which is defined as We can apply this definition to our scenario and show that the threat actor is the professor. In cybersecurity there are several types of threat actors which we can use to narrow down our focus to an insider threat.SentinelOne says this about insider threats (2019); when valued employees go ˜off the reservation™, the impact to an organization can be devastating, and potentially far more catastrophic than the
[Solved] CYB_200_Project_Threel.docx (1) 7-1 Project Three- Scenario One Southern New Hampshire U
- This solution is not purchased yet.
- Submitted On 03 Oct, 2022 01:11:59
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10