Description
Your C-Suite Presentation with the upper-level management in the last topic provided a glimpse into threat actors and their abilities. The CEO has decided that an in-depth training on this topic is needed from a top-down perspective to educate employees company-wide.
The CIO has tasked you to modify your C-Suite Presentation to include potential system attacks and the actors you identified that might be performed against the hospital. Your department is assigned the creation of a 3- to 5-minute cybersecurity educational video to help with this effort. Using your assignment from Topic 4, build upon the threat actors identified and address the following:
- Include relevant information from your C-Suite Presentation in Topic 4 at the beginning of the video.
- Describe potential system attacks and the actors that might perform them.
- Define the difference between a threat and a vulnerability.
- Provide at least two different attacks that each threat actor might perform against the hospital, from least serious threat to the most serious. You may not use the same attack on multiple threat actors, so choose carefully which threat actor is most likely to perform which attack.
Explanation & Answer
View attached explanation and answer. Let me know if you have any questions.
Running Head: THREAT
1
THREAT
Student Name
Institutional Affiliation
THREAT
2
Introduction
APT represents persistent and advanced threats. The threat actors have been very active in
the past decade. The threats pose a difficulty in detecting mainly because they have advanced
methods that use zero-day vulnerabilities or custom malware that most security systems cannot
recognize and identify. Everyone in the organization should view the APT group as external threats
that seek to manipulate data or gain financially. The targets of these groups include the defense
industry, health industry, and other strategic businesses that are large. This should be a point of
concern since, as an organization, we are among a group the threats focus upon.
Organized cybercriminals; Phishing actors might be cybercriminals. They target
enterprises and organizations like us, and they mostly seek financial profits. Cybercrime is
becoming a criminal's goldmine for criminals that are successful. Not because there are enormous
amounts of money involved, some claim that global damage related to cybercrimes is on the rise
heading to $6 trillion by the end of this year. Another reason is that actors are not required to
possess sophisticated means to achieve these crimes.
Organized cybercrimes are inspired ...