Process for Attack Simulation and Threat Analysis (PASTA) Risk Centric Threat Models

User Generated

nxva

Computer Science

Description

Create a DRAFT PowerPoint presentation using the PASTA method, make sure to include the following:

  • Chose a target (this is your choice, it could be a company, SCADA, IoT, etc.)
  • Threats to the target
  • Define the attack (high-level overview)
  • Define who will be conducting the attack
  • Walk thru the attack step by step
  • Categorizes your attack steps (reference PASTA Stage IV slide from presentation for example)
  • Outline your Vulnerability Analysis and Exploit Testing
  • At minimum 25 slides/document references in APA format
  • SUBMIT YOUR DRAFT AS YOUR ASSIGNMENT FOR THIS WEEK. This will be a 2 week assignment including peer reviews.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Bye!!!!!

Process for Attack
Simulation and Threat
Analysis (PASTA) Risk
Centric Threat Models
Student’s Name

Institution

Process for Attack Simulation and Threat
Analysis (PASTA)


This is a process that is used by system managers to
analyze cyber or computer threats by concentrating on

the influence it has on the business.


The PASTA approach also thrives to achieve the protection
of company’s digital data. This are information stored in
softcopy format on the company’s or organization’s
network.

Process for Attack Simulation and Threat
Analysis (PASTA)


PASTA considers that the assets on the network are
vulnerable to attacks and tries to bridge the vulnerability
framework posing threat to the assets on the network.



PASTA is an application software that also acts as web
application that are able to withstand the cyber threats.



It also relies on skilled personnel that uses the tools and
technology platform established by the application software.

PASTA Strategies


The introduction of new emerging computer threats

majorly for financial gains and damage of reputation
has made businesses to shift from defensive mechanisms
of installing firewalls and antivirus to detective
mechanisms.

Email Hosting company


This is an example of a company that faces a lot of cyber
threats of all sorts. From phishing to hacking.



A company dealing with email hosting is so critical in the

aspect of computer security as it can inconvenience a lot
of organizations that they provide the service to.


Such company has to be a step ahead in their security
protocols and implementation

Threats to the company


Phishing – This is an attack plotted by an attacker in the
attempt to obtain sensitive credentials by sending malicious

emails claiming to be fro trusted sources.


They usually exist in form of socially decorated message and
has authentic platform that the receiver has to log on to
access the email content

Threats to the company


Ransomware – This are kinds of attacks...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags