SEC 6060 Week 2 Discussion

docx

School

Wilmington University *

*We aren’t endorsed by this school

Course

6060

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by Admys

Report
Discuss something new you learned from the video.          There have been concepts that were absolutely new to me after watching and studying the lecture. The technological evolution and how it would have been happening for decades with most people aren't paying notice was among the unique insights that this video brought up and grabbed my attention. Most elements of our lives are being transformed by the advancement of digital technologies. The most fascinating aspect of this film is how warfare has evolved from what was formerly known as global conflicts to cyber fights. The majority of today's products are battled using digital information. These conflicts date back to those days when humans and science were isolated. Thus according to TEDx Talks (2013), the very first malicious program had to be implanted into computers using only a floppy disk, which meant that the cybercriminal had to move from one machine to the next to do it. This was followed by the usage of emails, then the internet, but nowadays technology is substituting humans. The frightening aspect of this scenario, and perhaps the whole history of technological advancement, is that we really do not properly understand it (TEDx Talks, 2013). How does the TED talk speak to Incident Response?            This webinar also provides useful information on incident response and cyber threat management. As per the speaker in the video, cyberspace is packed with hazards, and it is essential to take all necessary precautions when accessing the internet. Companies use "shadow platforms" to shield businesses against computer hackers. These are services that function as the genuine network and fool the hacker into thinking they were hitting the vulnerable systems. This offers the company an edge in learning much more about offenders and the strategies utilized, allowing it to devise appropriate responses for such assaults (TEDx Talks, 2013). What do you think the cyber threats are today?            A cyber attack is an intentional and destructive attempt by a person or organization to obtain unapproved access towards another person's or company's system in order to destroy, interrupt, or hijack IT resources, computer systems, copyrighted material, or any other type of confidential documents (StealthLabs, 2020). Cyber-attacks are becoming a more serious danger to smaller companies and the US economy. As per the FBI's Internet Crime Report, the value of cybercriminals is expected to exceed $2.7 billion in 2020. Smaller companies are appealing candidates since they have details that hackers demand and generally lack the network security that bigger companies possess. Research and develop a threat profile for a specific industry vertical.            The common threat profile covers a common set of fundamental asset risks. Prior to the assessment, this could be adjusted to match the demands of the company. The analytic group can create a new threat category, introduce additional threats to an original category, eliminate unrelated threats from such a segment, deconstruct or add depth to a danger category while customizing the overall threat profile. The conventional classifications are adequate for certain businesses. Other businesses may demand extra threat classifications. The threat classifications are situational and are determined by the areas where the business must function. The basic classifications are a nice place to start (Alberts & Dorofee, 2001). References
Alberts, C., & Dorofee, A. (2001). OCTAVE Threat Profiles.  Pittsburgh, Software Engineering Institute . StealthLabs. (2020). Cyber Security Threats and Attacks: All You Need to Know.  https://www.stealthlabs.com/blog/cyber-security-threats-all-you-need-to-know/   (Links to an external site.) TEDx Talks. (2013). Confessions of a cyber spy hunter | Eric Winsborrow | TEDxVancouver. https://www.youtube.com/watch?v=YiUN35Ikdfw
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help