{"id":30673,"date":"2024-08-03T01:54:14","date_gmt":"2024-08-03T01:54:14","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/6-2-narrated-presentation-threat-modeling-cyber-kill-chain-and-incident-response\/"},"modified":"2024-08-03T01:54:14","modified_gmt":"2024-08-03T01:54:14","slug":"6-2-narrated-presentation-threat-modeling-cyber-kill-chain-and-incident-response","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/6-2-narrated-presentation-threat-modeling-cyber-kill-chain-and-incident-response\/","title":{"rendered":"6.2 Narrated Presentation: Threat Modeling, Cyber Kill Chain, and Incident Response"},"content":{"rendered":"<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">In this assignment, you are acting as the new Chief Security Officer for an aviation organization. You have been asked to provide an overview for senior leadership on high-priority cybersecurity risks facing the organization and how you would propose to defend against them. Prepare a narrated presentation that has three parts:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">In Part 1, apply a threat modeling methodology to identify and prioritize three high-priority cybersecurity threats facing your organization.<\/li>\n<li style=\"cursor: auto; color: inherit;\">In Part 2, detail the attack and defend steps for each of the three identified cybersecurity threats using the Cyber Kill Chain methodology.<\/li>\n<li style=\"cursor: auto; color: inherit;\">In Part 3, present the elements of an incident response plan for each of the identified threats.<\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Your presentation should be a<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">minimum of 10 slides<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>and you should utilize a<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">minimum of 4<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>external resources.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this assignment, you are acting as the new Chief Security Officer for an aviation organization. You have been asked to provide an overview for senior leadership on high-priority cybersecurity risks facing the organization and how you would propose to defend against them. Prepare a narrated presentation that has three parts: In Part 1, apply [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/30673"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=30673"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/30673\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=30673"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=30673"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=30673"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=30673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}