Describe potential system attacks and the actors that might perform them and define the difference between a Threat and a Vulnerability.

Cyber Threats and Attack Vector

Your C-Suite Presentation with the upper-level management in the last topic provided a glimpse into threat actors and their abilities. (The copy of the C-Suite Presentation is attached).

The CEO has decided that an in-depth training on this topic is needed from a top-down perspective to educate employees company-wide.

ASSIGNMENT:

The CIO has tasked you to modify your C-Suite Presentation to include potential system attacks and the actors you identified that might be performed against the hospital.

Your department is assigned the creation of a 250-500 words cybersecurity educational report to help with this effort. Using your assignment from Topic 4 (which is attached), build upon the threat actors identified and address the following:

Include relevant information from your C-Suite Presentation in Topic 4 at the beginning of the report.

Describe potential system attacks and the actors that might perform them.

Define the difference between a Threat and a Vulnerability.

Provide at least two Different Attacks that each Threat Actor Might Perform against the hospital, from least serious threat to the most serious.

 

Describe potential system attacks and the actors that might perform them and define the difference between a Threat and a Vulnerability.
Scroll to top