Question: In previous modules, you studied different types of cyber attacks, and you have looked at threat modeling using the Howard Threat Model, which is a

In previous modules, you studied different types of cyber attacks, and you have looked at threat modeling using the Howard Threat Model, which is a small process that exists under the topic of cybersecurity. Tools like the Lockheed Martin Cyber Kill Chain can also be used to help extend threat modeling into incident handling. Discuss the use of tools like the Cyber Kill Chain to handle incident response for emerging technologies.

In response to your peers, discuss the possible gaps left by using a tool such as one described in their initial posts

Need a Response Please!!!!

Mark Guerrero

With the growing of emerging technologies whether they are new or existing ones the use of a Cyber Kill Chain tool is becoming prevalent when handling incident responses. Case in point, the growth of working remotely has made security a bigger issue. Especially so with threat actors searching for weak points in a network to exploit. The easiest way to compromise a network is through the network's endpoints thus making endpoint security essential. Using an endpoint protection (EPP) can help detect and mitigate stages of the cyber kill chain. An EPP is a suite that combines multiple layers of antivirus, data encryption, and data loss prevention all working together to detect and prevent attacks (Choice, 2022).

-Mark

References

Choice, E. (2022, December 1). The importance of endpoint security in breaking the cyber kill chain. Information Age. https://www.information-age.com/importance-endpoint-security-breaking-cyber-kill-chain-17852/

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!