Question: Include the problem statement from the previous deliverable for reference. Describe how a threat actor can utilize malware to breach the organizations security to exfiltrate
- Include the problem statement from the previous deliverable for reference.
- Describe how a threat actor can utilize malware to breach the organizations security to exfiltrate critical data assets. Use external resources from open-source intelligence (OSINT) to justify your claim.
- Propose two effective security controls against malware-based attacks and ways to monitor and assess the effectiveness of the security controls.
- For each proposed security control considered, provide a qualitative (descriptive) analysis of its operation, availability, cost, implementation issues, and overall benefit to the company.
- Provide a high-level flow diagram like the Microsoft Security Development Lifecycle (SDL) that shows how the implementation of DevSecOps can mitigate risks to the organizations computing resources. See Appendix A for more information.
Problem statement:
Microsoft should use a more proactive approach in defense of security threats rather than a reactive approach. This will allow the security professionals to identify and remove threats prior to them happening.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
