Assessment Details:
Today’s Internet has its roots all the way back in the late 1960s, but it was only used by researchers and the military for almost a quarter of a century. The Internet has opened
the door for threat actors to reach around the world invisibly and instantaneously to launch attacks on any device connected to it.
Under the 10 Major Cyber Attacks Witnessed Globally in Q1 2021, there are a list of 10
Major Cyber-attacks. Your tasks include:
1. Identify and examine Five (5) Major Cybersecurity’s Attack types of activities identified by securityboulevard.com from the list and summarize them into a table (using your own words).
2. Identify and categorise assets, including all elements of an organization’s system (people, procedures, data and information, software, hardware, and networking)
3. Create a table to identifying and prioritizing threats against each type of asset identified in item (2). You must demonstrate the way you follow to prioritizing threats with justification.
4. In general, the security defences should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. Write your own proposal strategies to prevent malware delivery and limit cyber-Security incidents. Analyse these proposed strategies and provide clear demonstration (justification) to your approach.
Create a report to answer the above questions, your report must include introduction and report summarisation in addition to a cover page that includes your details.