100% (1)
page:
2 pages/≈550 words
Sources:
0
Style:
APA
Subject:
Communications & Media
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 9.5
Topic:

Cybersecurity Tools

Coursework Instructions:
Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors. Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team. This is a team assignment, and the team members that were selected by the instructor in the previous assignment will work together. It is up to the team members to decide who is responsible for contributing to the sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. Your team's report should use the The Cybersecurity Threat Landscape Team Assignment Resources Here are the instructions for this assignment. Cybersecurity Tools, Tactics, and Procedures Describe current hardware- and software-based cybersecurity tools, tactics, and procedures. Consider the hardware and software solutions deployed today in the context of defense-in-depth. Elaborate on why these devices are not successful against the APTs.
Coursework Sample Content Preview:
CyberSecurity Tools Name Institution Course Instructor Date CyberSecurity Tools Introduction Advanced Persistent Threats (APTs) pose significant challenges worldwide due to their advanced cyber threat techniques, tactics, procedures, and resources(Handa et al., 2019). Numerous organizations have deployed software and hardware cybersecurity tools to combat these APTs, but they continue to cause damage and evade detection(Handa et al., 2019). Therefore, there is a need for organizations to employ an adaptive and proactive approach to contain this menace of cybersecurity. We will focus on the current digital landscape of cybersecurity tactics, tools, and procedures in this report. Besides, we will also examine the limitations of these tools against APTs. Cybersecurity Tactics, Tools, and Procedures 1 Hardware-Based Solutions Hardware-based solutions protect systems against cyber threats at the foundational layer within the organizations’ infrastructure. These solutions combat APTs through monitoring, securing, and controlling data that flows across devices and networks(Garret, 2018). Some of the hardware-based APT solutions include Intrusion Prevention Systems, Intrusion Detection Systems, and firewalls. Intrusion Detection Systems (IDS) IDS is a cybersecurity tool that monitors network traffic and detects alerts for policy violations and malicious activities(Garret, 2018). Therefore, an IDS protects against APTs by detecting malicious activities and alerting system administrators to take appropriate security measures. IDS identifies and mitigates APTs that can trigger costly data breaches, damage to organizations’ reputations, or loss of sensitive data (Garret, 2018). Additionally, IDS assists in ensuring that the organization complies with the required security standards and industry regulations like ISO 27001, HIPAA, or PCI-DSS. Intrusion Prevention Systems (IPS) IPS is also another cybersecurity solution that can prevent and mitigate cyberattacks. This tool builds on IDS capabilities to provide enhanced network defense and real-time th...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!