.


CSEC378/418 Extra Credit 2 2 Points of Available Extra Credit Watch and Reflect on a Security Talk Purpose: Watch a security related talk that is on a topic that is interesting to you, preferably one that you are not already overly familiar with. Reflect on the contents of the talk and write up a summary and reflection on what you learned. Assignment: Find a recording of a live Cybersecurity presentation that is more than 30 minutes long. Preferably use a talk from a security conference like DefCon, Derbycon, Shmoocon, etc. Present a 2-3 page (Double spaced, 1” margins, 12pt Times New Roman font) write up. This write up should include a summary of what the talk was about and a reflection regarding what you learned from this talk. Did you find the talk interesting? Why? Did you know about the subject matter before watching the video? What did you learn from the video? Did you have any questions after watching the video? Your submission MUST include a link to the video that you watched. If you need ideas of where to look for an acceptable presentation, or you want to check to make sure that your presentation is acceptable before you write it up, please let me know. If you have questions about the assignment, please ask me during class or send me an email. CSEC378/418 Extra Credit 2 2 Points of Available Extra Credit Watch and Reflect on a Security Talk Purpose: Watch a security related talk that is on a topic that is interesting to you, preferably one that you are not already overly familiar with. Reflect on the contents of the talk and write up a summary and reflection on what you learned. Assignment: Find a recording of a live Cybersecurity presentation that is more than 30 minutes long. Preferably use a talk from a security conference like DefCon, Derbycon, Shmoocon, etc. Present a 2-3 page (Double spaced, 1” margins, 12pt Times New Roman font) write up. This write up should include a summary of what the talk was about and a reflection regarding what you learned from this talk. Did you find the talk interesting? Why? Did you know about the subject matter before watching the video? What did you learn from the video? Did you have any questions after watching the video? Your submission MUST include a link to the video that you watched. If you need ideas of where to look for an acceptable presentation, or you want to check to make sure that your presentation is acceptable before you write it up, please let me know. If you have questions about the assignment, please ask me during class or send me an email.
Answered 2 days AfterMay 28, 2022

Answer To: .

Tanmoy answered on May 30 2022
103 Votes
Cybersecurity Conference        4
CYBERSECURITY CONFERENCE
Table of Contents
Introduction    3
Analysis    3
Conclusion    5
References    6
Introduction
    This is a
live conference held on 16th March, 2022 by Klint Walker who is the Cyber Security Advisor from Region IV which consists of Alabama, Florida, Georgia, Tennessee and many other states of USA. In the live conference, Klint discusses about the incident management plan for cybersecurity with respect to insider threats, acts of terrorism, cyber-attacks, extreme weather conditions, pandemic such as covid-19 and technical failures. Further, Klint discusses about the cyber threats which can have an operational impact on the company’s performance. These cyber threats are ransomware, malware, Advanced Persistent Threats (APT) and threats from 3rd party vendors, infrastructure and service providers. Klint also discusses of the mechanics used in the process of cyber-attacks. Finally, he discusses of the targets of these cyber attacks and elaborates on the cyber security incident management plan. This is a 56 minutes and 40 seconds live conference extracted from YouTube.
Analysis
    It is during the user or customer services we disclose valuable information to the threat actors. They use various attempts to get access of the customer data. These are spearfishing attempts, sending spam and phishing emails to the users. The example stated by Klint is during the ordering of food by the customers where the threat actors send a link and recommends the user to purchase foods by clicking on...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here