Brainstorm and identify cybersecurity threats using the circle map template. Refer to the attached Circle Map Directions and the Student Examples.
Use the circle map to classify the threat.
Then identify the attacks associated with the threat category. In this step, you will brainstorm and list new as well as legacy cyber-threats used in hacks in the last decade. Then categorize these threats as malware, trojans, DOS, DDOS, viruses, etc. After categorizing the threats, you will identify and associate attacks using the category of threats created in first part of this activity.
You will be identifying the attacks that a company may face as a vulnerability. You are expected to submit a minimum of three circle maps merged into a single document.