Question: Module 1 - 2 : Data Breach Discussion When looking at the threat landscape, there are different types adversaries and they pose different types of

Module 1-2 : Data Breach Discussion
When looking at the threat landscape, there are different types adversaries and they pose different types of threats depending on their capabilities, intentions, and the assets they are targeting. For example, nation states might target research companies or military websites trying to steal confidential and proprietary data. In addition, companies react to the loss of assets differently. The level and types of mitigation strategies will vary among organizations depending on whether there is a loss of one asset or of an entire category of assets.
For your initial post, identify a recent cybersecurity incident (within the last two years). Briefly summarize the incident, and post a link to an article on the incident if possible. Try to identify the threat actor(s) and the goal or intent of the attack. If there is no "why" put on your adversarial thinking cap and hypothesize what you think is the "why".
Note: Look around and don't take the top articles and try to avoid not using the same as your peers that have posted.
In your responses (2 minimum) to your classmates, think about possible mitigation steps that were not mentioned in the article.
Module 1 - 2 : Data Breach Discussion When

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!