What appropriate business strategies would you implement


Problem

Research a recent (within the past 5 years) cyber operation conducted by an Advanced Persistent Threat (APT) within an academic journal. help with a twelve hundred - to fifteen hundred word case study and address the following:

1. Potential motivations that may have prompted an entity to perform the cyber operation.

2. Specific phases of a cyber operation in network traffic and which phases were utilized by the APT against the target.

3. How might the targeted organization utilize a penetration test to identify flaws from documentation and how could the penetration test have helped secure the network or system?

4. How does a penetration test help support intellectual property from the perspective of the CIA triad?

5. Summarize the laws that provide US entities the authority to perform cyber operations.

6. Do the laws provide the organization that was attacked with the legal authority to hack back? Justify your answer.

7. What appropriate business strategies would you implement to ensure the sustainability, availability, and reliability of your network? How are these strategies relevant to stakeholders within your organization?

8. How would you apply appropriate qualitative and quantitative analytic methodologies to predict trends and communicate security strategies to meet business objectives?

9. From a foundational position, how would the use of various tools, technologies, and concepts of a penetration test support confidentiality, integrity, and availability?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What appropriate business strategies would you implement
Reference No:- TGS03360376

Expected delivery within 24 Hours