Cyber security discussion 1


Having Trouble Meeting Your Deadline?

Get your assignment on Cyber security discussion 1  completed on time. avoid delay and – ORDER NOW

Cybersecurity plays an important role in the field of information technology. Securing the information have become one of the biggest challenges for today’s organizations. Connecting to the Internet opens up the possibility of a hacker targeting the organization. Cybercrime is becoming big business and cyber risk a focus of organizations and governments globally. Monetary and reputational risks are high if organizations do not have an appropriate cybersecurity plan.

For this discussion board, you will use the Mitre ATT&CK website. This is a global knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. Cyber threat intelligence is all about knowing what your adversaries do and using that information to improve decision-making. For an organization with just a couple of analysts that wants to start using ATT&CK for threat intelligence, one way you can start is by taking a single group you care about and looking at their behaviors as structured in ATT&CK. There are 135 groups, which means each student should be able to locate a group different than their peers’. Doing so will enhance the conversation and help expand the knowledge shared.

Using the MITRE ATT&CK groups menu, identify a group as a starting point to answer the following discussion questions.

Discussion Questions

  1. What are some of the techniques and procedures used by the group you identified?
  2. What are ways you as a technology manager may mitigate the techniques and procedures used by the group you identified?
  3. What is the importance of cybersecurity in the field of information technology?
  4. How does having this knowledge of cyber attacks improve an organizations cybersecurity posture?

Discussion Topics requirements

  • This response should be minimum 250 words minimum for each question.
  • Respond to at least two of your peers. Peer responses should be approximately 100 – 150 words each. Three peer replies on two separate days will earn more points.
  • Provide cogent responses by either supporting or debating your fellow students’ posts, and explain your viewpoint(s) clearly.
  • References must be cited and in current APA format.
  • Minimum of 2 references to support your views
Explanation & Answer

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Order Now and we will direct you to our Order Page at Litessays. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Similar Posts