Assignment: Practices for Cyber Threats & Defense
a. Define what constitutes a secure posture and how it helps in understanding the importance of having a good defense and attack strategy.
b. Describe the Incident Response Process and the importance of having one? Be sure to include some industry standards and best practices for handling incident response in your answer.
c. What is a Cyber Strategy and why is it needed? How can you build an effective enterprise cyber strategy?
d. What is the Cybersecurity Kill Chain, the different stages of the attack, and what are some examples of activities that occur in each one of those phases?
e. What are some strategies to perform reconnaissance?
f. What are some current trends in strategies to compromise a system?
g. Describes lateral movement and how attackers perform lateral movement once they compromise a system.
h. What is Privilege Escalation and describe some ways attackers can escalate privileges in order to gain administrative access to a network system?
i. What is Threat Intelligence and proves a few different aspects of threat intelligence?
j. What is the Recovery Process?
k. Describe Vulnerability Management and the importance of vulnerability management to mitigate vulnerability exploitation.
l. Describe log analysis and provide some techniques for manual log analysis since it is critical for the reader to gain knowledge on how to deeply analyze different types of logs to hunt suspicious security activities
Format your assignment according to the give formatting requirements:
a. The answer must be double spaced, typed, using Times New Roman font (size 12), with one-inch margins on all sides.
b. The response also includes a cover page containing the title of the assignment, the course title, the student's name, and the date. The cover page is not included in the required page length.
c. Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.