Search for question
Question

INSTRUCTIONS Overview Since you did such a superb job in mitigating attacks from nefarious foreign actors, the joint task force has asked for your assistance once again with a new

issue. They have asked you to assist in hardening their systems to withstand cyberattacks that nation-state actors may conduct on national soil or to protect them if, for some other reason, their network security controls are compromised. Based on what you have learned thus far, suggest other threat vectors and what controls could be used to further mitigate those threats. Instructions Write a 3-4 page report double spaced in which you answer the following: Evaluate the threat posed by viruses, malicious code, and virus hoaxes, and the extent of their effect on computers and productivity. Analyze denial of service attacks and blended threats. Analyze the operation of a Trojan horse and how it is different from a standard virus. Analyze two threat vectors and what controls could be used in order to further mitigate those threats. Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides. This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment is: Evaluate different types of attacks and their characteristics. Need to do in 3 -4 pages double spaced, 12 FONT MARGIN