Cybersecurity threats

Brainstorm and identify cybersecurity threats using the circle map template. Refer to the attached Circle Map Directions and the Student Examples.

Use the circle map to classify the threat.

Then identify the attacks associated with the threat category. In this step, you will brainstorm and list new as well as legacy cyber-threats used in hacks in the last decade. Then categorize these threats as malware, trojans, DOS, DDOS, viruses, etc. After categorizing the threats, you will identify and associate attacks using the category of threats created in first part of this activity.

You will be identifying the attacks that a company may face as a vulnerability. You are expected to submit a minimum of three circle maps merged into a single document.

Unlock Your Academic Potential with Our Expert Writers

Embark on a journey of academic success with Legit Writing. Trust us with your first paper and experience the difference of working with world-class writers. Spend less time on essays and more time achieving your goals.

Order Now