How does a penetration test help support intellectual property from the perspective of the CIA triad?
Order Instructions
Assessment Description
Understanding the factors associated with successful cyber attacks allows for professionals to gain a better conceptual knowledge of trends and methodologies used by malicious actors. In this assignment, we will identify the methodologies used by attackers from a technological standing and research preventive measures that could have protected our systems.
View the “Cyber Operations Case Studies” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources.
Research a recent (within the past 5 years) cyber operation conducted by an Advanced Persistent Threat (APT) within an academic journal. Write a 1,200- to 1,500-word case study and address the following:
Potential motivations that may have prompted an entity to perform the cyber operation.
Specific phases of a cyber operation in a network traffic and which phases were utilized by the APT against the target.
How might the targeted organization utilize a penetration test to identify flaws from documentation and how could the penetration test have helped secure the network or system?
How does a penetration test help support intellectual property from the perspective of the CIA triad?
Summarize the laws that provide US entities the authority to perform cyber operations.
Do the laws provide the organization that was attacked with the legal authority to hack back? Justify your answer.
What appropriate business strategies would you implement to ensure sustainability, availability, and reliability of your network? How are these strategies relevant to stakeholders within your organization?
How would you apply appropriate qualitative and quantitative analytic methodologies to predict trends and communicate security strategies to meet business objectives?
From a foundational position, how would the use of various tools, technologies, and concepts of a penetration test support confidentiality, integrity, and availability?
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Study Success Center. This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.
Benchmark Information
This benchmark assignment assesses the following programmatic competencies:
MS-Cybersecurity
1.1: Apply and use of various tools, technologies, and concepts to support the Confidentiality, Integrity, and Availability of Intellectual Property.
1.2: Apply appropriate qualitative and quantitative analytic methodologies to predict trends and communicate security strategies to meet business objectives.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.