Identifying cyber threats and applying the cyber kill chain


Assignment task: Identifying Cyber Threats and Applying the Cyber Kill Chain

Scenario:

The DoD has requested a review of the vulnerabilities of the Western Interconnection power grid computer network, with strategies for reducing or eliminating the vulnerabilities. They also want a brief profile of the cyberattackers, using the Adversary Model as a foundation. You will need to research this model, which focuses on resources, capabilities, intent, motivation, risk aversion, and access.

Tasks:

For this part of the project, perform the following tasks:

Perform research that:

1. Identifies and describes a specific type of malware that could affect the Western Interconnection power grid computer network. Explain how the malware could be installed in the network covertly, and the action the malware would take to disrupt the network.

2. Applies the Cyber Kill Chain to the identified malware, including a diagram that shows the steps to be taken to eradicate it

3. Applies the Adversary Model to the cyber attack group

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Identifying cyber threats and applying the cyber kill chain
Reference No:- TGS03302049

Expected delivery within 24 Hours