Computer Science Homework Help
CST 610 CALUMS Cycle of A Cyber Threat Essay
- Provide an overview of the life cycle of a cyberthreat.
- Explain the different threat vectors that cyber actors use and provide a possible list of nation-state actors that have targeted the US financial services industry before.
- Review this threat response and recovery resource and use what you learn to propose an analytical method in which you are able to detect the threat, identify the threat, and perform threat response and recovery.
- Identify the stage of the cyberthreat life cycle where you would observe different threat behaviors. Include ways to defend and protect against the threat. Provide this information in your SAR and AAR. Ensure that the information is appropriately cited