Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cybersecurity ATD Scenario conclusion

Similar presentations


Presentation on theme: "Cybersecurity ATD Scenario conclusion"— Presentation transcript:

1 Cybersecurity ATD Scenario conclusion

2 ATD objectives Apply 5-step cybersecurity framework throughout the system's lifecycle Analyze via representative system Apply cybersecurity risk management process Recognize role of team approach to cybersecurity success Analyze risk; consequences and likelihood via risk cube Develop alternatives to material/non-material solution(s) via tradeoff analyzes Students should be able to understand: the difference between threat, risk, attack and vulnerability how threats materialize into attacks where to find information about threats, vulnerabilities and attacks typical threats, attacks and exploits and the motivations behind them high-level understanding of how example attacks work (e.g. DDOS, phishing and buffer overflow) how users are targeted in an attack and why this must be considered in defending against such attacks the concept of a threat landscape, its dynamic nature and how to create a landscape for an organization how to classify threats and example categories that there are different attacks, which have different patterns and different steps – for example be able to compare a DDOS to an attack designed to copy information how to classify threats and example categories that there are different types of malware – for example viruses, Trojans and spyware – their distribution mechanism and a detailed understanding of how they compromise information and systems that attacks can be combined for greater effect (e.g. phishing , followed by social engineering phone call)

3 CYBERSECURITY ACQUISITION STRATEGY
Adjust your plans to execute the acquisition strategy: NEAR MID LONG TERM TERM TERM Implement Contingency Plans Implement CONOPS Material/Non-Material Solutions Training Policies/Procedures Develop Acquisition and Strategic Plans Students should be able to understand: the difference between threat, risk, attack and vulnerability how threats materialize into attacks where to find information about threats, vulnerabilities and attacks typical threats, attacks and exploits and the motivations behind them high-level understanding of how example attacks work (e.g. DDOS, phishing and buffer overflow) how users are targeted in an attack and why this must be considered in defending against such attacks the concept of a threat landscape, its dynamic nature and how to create a landscape for an organization how to classify threats and example categories that there are different attacks, which have different patterns and different steps – for example be able to compare a DDOS to an attack designed to copy information how to classify threats and example categories that there are different types of malware – for example viruses, Trojans and spyware – their distribution mechanism and a detailed understanding of how they compromise information and systems that attacks can be combined for greater effect (e.g. phishing , followed by social engineering phone call)

4 Acquisition & operations
Threat Mgmt. Implementation Cyber Operations Test and Development Security Architecture and Engineering

5 Atd outcomes Smart Planning Early Trade-Space and Trade-Offs
People/Process Team Sport Acquisition and Operation linkage


Download ppt "Cybersecurity ATD Scenario conclusion"

Similar presentations


Ads by Google