Chain?" in the Readings and Instructional Material section of Week 5.
• How can you apply the concepts from this video as part of an overall
cybersecurity and cyber resilience strategy?
• What processes, tools, and techniques do you think would be effective to
discover and disrupt a cyber-attack while it's underway?
This week's chapter of the course textbook focuses on threats, vulnerabilities, and the management
processes needed to address them within the cybersecurity and cyber resilience strategy. Chapter 4
Cyber Threats, Vulnerabilities and Intelligence Analysis (Siegel and Sweeney 2020)
https://www.youtube.com/watch?v=zhClg4cLemc%20