Discussion 5 - Defender's methods and applications without awareness

Question # 00857171 Posted By: wildcraft Updated on: 07/05/2024 10:21 PM Due on: 07/06/2024
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

D5

Manage Discussion

Purpose

This assignment is intended to help you learn to solidify, reflect on, and find applications for the week's topics.

Overview

Defender's methods and applications without awareness of what offenders are doing will not be effective. Non-profit MITRE organization is doing excellent work for organizations to understand what offenders are doing to hack into the networks. Please watch the short video about MITRE-ATT&CK Analysis and also review the MITRE ATT&CK webpage:

· MITRE ATT&CK® Framework Links to an external site.

· MITRE ATT&CK® webpage Links to an external site.

Action Items

1. read/watch the resources as indicated above. Post a 3- to 4-paragraph (375 to 500 words) discussion and reflection on the topics.

· Consider this to be a mini "reflection paper" per most of your other course work. Talk about what was interesting, difficult, or surprising in what you read. Note any "ah-ha!" moments.

· Find a current news article or journal article that highlights the topics for the week. Summarize the article's main points, and connect them to the material you read/watched in the resources of the current module.

· Connect the topics from the above resources back into prior coursework you have taken at Franklin or other institutions. Talk about where you first encountered the topics or concepts and whether or not this exposure to them enhanced or solidified your understanding.

2. Cite your sources. Sometimes this can be as simple as copying a URL into your posting or providing the author's name and the title of the book or article referenced. Of course, if you quote an author, you must provide a full citation in APA format.

Dot Image
Tutorials for this Question
  1. Tutorial # 00852664 Posted By: wildcraft Posted on: 07/05/2024 10:21 PM
    Puchased By: 2
    Tutorial Preview
    The solution of Discussion 5 - Defender's methods and applications without awareness...
    Attachments
    Discussion_5_-_Defenders_methods_and_applications_without_awareness.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa