Courses of Action Overview

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

IT-549-Q15

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

2

Uploaded by ElderLightning8081

Report
Courses of action tables are intended to be living documents that change as attackers evolve their attacks and incident responders mature their defensive capabilities. This activity provides you the opportunity to draft an action table from the ground up as a means of understanding the methodology. As you have learned, analyzing the purposes, tactics, and features of adversarial threats is a key step in reducing vulnerabilities and protecting assets, as well as preventing and mitigating security incidents. By recognizing adversarial effects, security professionals target their response to maximize effectiveness. In Milestone Two, you will draft section II.B of the final project: the courses of action table. This courses of action table is informed by the final project scenario. The table will include attack methods and features, detection locations and detection methods, and response objectives and methods. In examining this table, the stakeholder audience should be able to see how security measures employed by the response team align with the features of the adversarial threat. Some elements of the table have been completed for you to provide context. To prepare for the assignment, be sure to review the Final Project Guidelines and Rubric document to see how this milestone fits in the overall project. Also review the Final Project Scenario and Final Project Support documents. You will note the rubric in this milestone activity is somewhat different, in that it is designed for you to have the opportunity to submit a draft of your work and receive valuable feedback for improving it. The Final Project Rubric will require a higher level of performance
Prompt Specifically, the following critical elements must be addressed: 2. Courses of Action Table: You were provided with a Courses of Action Table template to use as the basis of this part of your project. Your completed courses of action table must address the full flow of a potential attack specific to the one in your provided scenario. 1. Attack Methods and Features: Describe logical steps to model a potential attack from start to finish. 2. Detection Location and Detection Methods: Describe potential detection location and methods for different steps in an attack pattern. 3. Responsive Objective: Identify the effects you want to achieve in countering the attack and how you want to achieve it. 4. Response Method: Identifies response methods that are logical and feasible in addressing the nature of the attack.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: You've just been hired by RhombiData. The new job includes company contributions to a qualified…
Q: A. Y -8-7-6-5-4-3-2-1, 12345678 -2 87654321 C. yzx-2 ܐ ܕ ܬ ܗ ܗ ܬ ܤ B. y<x-2 D. y ≤ x-2
Q: Explain Mesh Topology.
Q: The electrochemical gradient is __________________. A. The total chemical potential gradient B. The…
Q: Which two triangles are congruent by the SAS Theorem? Complete the congruence statement. Q Y W R.
Q: Find the specified value(s). 17. X = 18. X = m/E= DZX° E 2xd 21 F
Q: List three ways technology has enhanced productivity at the workplace
Q: Would you address Matt and Helen's family history?
Q: Q1: which of the following statements about creating an array (size 10) of the below structure is…
Q: NOTE: This is a multi-part question. Once an answer is submitted, you will be unable to return to…
Q: 0.6x0.8
Q: If λ = 6 per hour and μ = 6 per hour in an (M/M/1): (5/FIFO) model, find the probability that there…
Q: Suppose that a salesperson earns a basic monthly salary of $800 plus a commission rate is 15% and…
Q: 3. Suppose it is known that the proportion of students who get an A in a particular statistics…
Q: Find the Equation for the Graph of a Logarithmic Function (-4,3) * (2,4) f(x) = log₂ (x ) Type your…
Q: Page 217, 3.6.10.* If F has an F-distribution with parameters r1 = 3 and r2 = 9, find 'a' and 'b' so…
Q: 1. ON THE RETAINING WALL TO THE RIGHT, DRAW THE WALL AND FOOTING REINFORCING STEEL IN THE PROPER…
Q: An electric lift is required to raise a load of 5 tonne through a height of 30 m. One quarter of…
Q: Automated teller machines (ATMs) expand bank services, especially since you can withdraw funds from…
Q: Comparing Mitosis and Meiosis - Differences Between Stages Stage Stage Number Name 0 1 2 3 MITOSIS…
Q: 1. ON THE RETAINING WALL TO THE RIGHT, DRAW THE WALL AND FOOTING REINFORCING STEEL IN THE PROPER…
Q: List three ways technology has enhanced productivity at the workplace