Discussion: Cyber Security
Zero-day attacks are fascinating in part because they're very hard to identify and thus defend against. But as network defenders we are not without options. Our text describes zero-day attack methodology, as well as a few countermeasures to defend against zero-day attacks. One defense mechanism discussed is heuristic scanning. What are the pros and cons of deploying heuristic scanning techniques in an operational network?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.