Cyberwarefare_2.docx Cyber
- From Economics, General Economics
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10
cyberwarefare_2.docx Cyberwarfare - C688 To: Department of Defense(DoD) From: Subject: Cyber Defense Report- Task 2 E SUMMARY Recently, attacks on industrial critical infrastructure have become so attractive to APT groups. Especially the states sponsored APTs because most of their operations are mainly not for a financial reason, but economic sabotage. This report will analyze all the threats and vulnerabilities affecting this critical infrastructure and the Cyber Kill Chain that can be used to address them. Further on this report, defense-in-depth policies and procedures will be recommended to help secure the SCADA networks in the Western Interconnection Power Grid(WIPG). A1 RECONNAISSANCE These are all the actions carried out by APT groups in gathering information about their potential target. This mostly the first stage of the attack as it relates to cyber kill chain. This normally set the stage for the future attack. They of two categories; passive and active reconnaissance. In passive reconnaissance, the attacker will be gathering information about their target from public sources. As in the case of WIPG, these attackers will be visiting the company's LinkedIn page, Facebook page. Gathering information about the staffs and their job role in the company. Visiting their Facebook and LinkedIn pages with a view to knowing more details about them, their education, positions they have held before, what tools and te
[Solved] cyberwarefare_2.docx Cyber
- This solution is not purchased yet.
- Submitted On 31 Jul, 2022 05:16:49
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10