SlideShare a Scribd company logo
1 of 1
Download to read offline
Description
Find a cybersecurity incident that has recently occurred and been published in the news.
For the identified incident, determine the following characteristics:
- Threat source
- Threat event
- Vulnerability exploited
- Technical and business impact
Learning outcomes being met through this assessment
Identify the various characteristics of a risk
Steps to complete the assignment
1. Read the description of the assignment in this document.
2. Select a recent cybersecurity incident found in the news.
3. For the identified incident, determine the following risk characteristics
a. Threat source (or threat actor)
b. Threat event
c. Vulnerability exploited
d. Technical and business impact
4. Document the selected cybersecurity incident (with reference) and the required characteristics
in a Word document.
5 Correct identification of the risk characteristics

More Related Content

Similar to Description Find a cybersecurity incident that has recently .pdf

Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxelinoraudley582231
 
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...apidays
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...CompTIA
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPSymantec
 
Youve been hired as a network and information security officer for a.pdf
Youve been hired as a network and information security officer for a.pdfYouve been hired as a network and information security officer for a.pdf
Youve been hired as a network and information security officer for a.pdffamilycitymen
 
Presentation eu osha oi-ra[1]
Presentation eu osha oi-ra[1]Presentation eu osha oi-ra[1]
Presentation eu osha oi-ra[1]Brett Parker
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist- Mark - Fullbright
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutDevSecCon
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web ApplicationsNadia BENCHIKHA
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersPROBOTEK
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical HackingIRJET Journal
 
Apply your knowledge learned about the architecture that fac.pdf
Apply your knowledge learned about the architecture that fac.pdfApply your knowledge learned about the architecture that fac.pdf
Apply your knowledge learned about the architecture that fac.pdfADITYAMOBILEGALLRY
 
Winchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanWinchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanR. Curtis Roth
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modelingkeyuradmin
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Part ASelect an organization you wish to explore and use .docx
Part ASelect an organization you wish to explore and use .docxPart ASelect an organization you wish to explore and use .docx
Part ASelect an organization you wish to explore and use .docxssuser562afc1
 

Similar to Description Find a cybersecurity incident that has recently .pdf (20)

Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docx
 
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
Youve been hired as a network and information security officer for a.pdf
Youve been hired as a network and information security officer for a.pdfYouve been hired as a network and information security officer for a.pdf
Youve been hired as a network and information security officer for a.pdf
 
Presentation eu osha oi-ra[1]
Presentation eu osha oi-ra[1]Presentation eu osha oi-ra[1]
Presentation eu osha oi-ra[1]
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 
Apply your knowledge learned about the architecture that fac.pdf
Apply your knowledge learned about the architecture that fac.pdfApply your knowledge learned about the architecture that fac.pdf
Apply your knowledge learned about the architecture that fac.pdf
 
Winchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanWinchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response Plan
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modeling
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Part ASelect an organization you wish to explore and use .docx
Part ASelect an organization you wish to explore and use .docxPart ASelect an organization you wish to explore and use .docx
Part ASelect an organization you wish to explore and use .docx
 
Cmgt 400 cmgt400
Cmgt 400 cmgt400Cmgt 400 cmgt400
Cmgt 400 cmgt400
 

More from adcrates2010

Determine si las afirmaciones pertenecen a una poblacin o a.pdf
Determine si las afirmaciones pertenecen a una poblacin o a.pdfDetermine si las afirmaciones pertenecen a una poblacin o a.pdf
Determine si las afirmaciones pertenecen a una poblacin o a.pdfadcrates2010
 
Determine Gales income tax each year from through assumin.pdf
Determine Gales income tax each year from through  assumin.pdfDetermine Gales income tax each year from through  assumin.pdf
Determine Gales income tax each year from through assumin.pdfadcrates2010
 
Depo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdf
Depo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdfDepo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdf
Depo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdfadcrates2010
 
Despus de leer el artculo responda las preguntas que sigu.pdf
Despus de leer el artculo responda las preguntas que sigu.pdfDespus de leer el artculo responda las preguntas que sigu.pdf
Despus de leer el artculo responda las preguntas que sigu.pdfadcrates2010
 
Description of the project Purpose To implement a simple au.pdf
Description of the project Purpose To implement a simple au.pdfDescription of the project Purpose To implement a simple au.pdf
Description of the project Purpose To implement a simple au.pdfadcrates2010
 
Design Patterns Java An Internet Service Provider ISP no.pdf
Design Patterns Java  An Internet Service Provider ISP no.pdfDesign Patterns Java  An Internet Service Provider ISP no.pdf
Design Patterns Java An Internet Service Provider ISP no.pdfadcrates2010
 
Describe what you think the company is doing right in regard.pdf
Describe what you think the company is doing right in regard.pdfDescribe what you think the company is doing right in regard.pdf
Describe what you think the company is doing right in regard.pdfadcrates2010
 
Describe what is meant by a graded river At steady state i.pdf
Describe what is meant by a graded river At steady state i.pdfDescribe what is meant by a graded river At steady state i.pdf
Describe what is meant by a graded river At steady state i.pdfadcrates2010
 
Describe the properties of a neutron star Density Neutro.pdf
Describe the properties of a neutron star  Density Neutro.pdfDescribe the properties of a neutron star  Density Neutro.pdf
Describe the properties of a neutron star Density Neutro.pdfadcrates2010
 
Design a project document for a Ddos attack detection projec.pdf
Design a project document for a Ddos attack detection projec.pdfDesign a project document for a Ddos attack detection projec.pdf
Design a project document for a Ddos attack detection projec.pdfadcrates2010
 
Describe what a balance sheet tells about a business in your.pdf
Describe what a balance sheet tells about a business in your.pdfDescribe what a balance sheet tells about a business in your.pdf
Describe what a balance sheet tells about a business in your.pdfadcrates2010
 
Design a Data Base many to many each house can have many .pdf
Design a Data Base many to many each house can have many .pdfDesign a Data Base many to many each house can have many .pdf
Design a Data Base many to many each house can have many .pdfadcrates2010
 
Desea revisar las dependencias de tareas en su programa ante.pdf
Desea revisar las dependencias de tareas en su programa ante.pdfDesea revisar las dependencias de tareas en su programa ante.pdf
Desea revisar las dependencias de tareas en su programa ante.pdfadcrates2010
 
Desde una perspectiva muy bsica la respiracincombustin .pdf
Desde una perspectiva muy bsica la respiracincombustin .pdfDesde una perspectiva muy bsica la respiracincombustin .pdf
Desde una perspectiva muy bsica la respiracincombustin .pdfadcrates2010
 
Describe how Nanoporebased nucleic acid sequencing takes ad.pdf
Describe how Nanoporebased nucleic acid sequencing takes ad.pdfDescribe how Nanoporebased nucleic acid sequencing takes ad.pdf
Describe how Nanoporebased nucleic acid sequencing takes ad.pdfadcrates2010
 
Describe a time when you were able to achieve something that.pdf
Describe a time when you were able to achieve something that.pdfDescribe a time when you were able to achieve something that.pdf
Describe a time when you were able to achieve something that.pdfadcrates2010
 
Describe a leader with whom you are familiar You can choose.pdf
Describe a leader with whom you are familiar You can choose.pdfDescribe a leader with whom you are familiar You can choose.pdf
Describe a leader with whom you are familiar You can choose.pdfadcrates2010
 
Description 1 Imagine a young person recently graduated fr.pdf
Description 1 Imagine a young person recently graduated fr.pdfDescription 1 Imagine a young person recently graduated fr.pdf
Description 1 Imagine a young person recently graduated fr.pdfadcrates2010
 
Describe the two escalator model that economists Case and .pdf
Describe the two escalator model that economists Case and .pdfDescribe the two escalator model that economists Case and .pdf
Describe the two escalator model that economists Case and .pdfadcrates2010
 
Describir las caractersticas anatmicas craneales y poscran.pdf
Describir las caractersticas anatmicas craneales y poscran.pdfDescribir las caractersticas anatmicas craneales y poscran.pdf
Describir las caractersticas anatmicas craneales y poscran.pdfadcrates2010
 

More from adcrates2010 (20)

Determine si las afirmaciones pertenecen a una poblacin o a.pdf
Determine si las afirmaciones pertenecen a una poblacin o a.pdfDetermine si las afirmaciones pertenecen a una poblacin o a.pdf
Determine si las afirmaciones pertenecen a una poblacin o a.pdf
 
Determine Gales income tax each year from through assumin.pdf
Determine Gales income tax each year from through  assumin.pdfDetermine Gales income tax each year from through  assumin.pdf
Determine Gales income tax each year from through assumin.pdf
 
Depo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdf
Depo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdfDepo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdf
Depo Ynetim Sistemi depo ynetim sistemi kontrol etmek ii.pdf
 
Despus de leer el artculo responda las preguntas que sigu.pdf
Despus de leer el artculo responda las preguntas que sigu.pdfDespus de leer el artculo responda las preguntas que sigu.pdf
Despus de leer el artculo responda las preguntas que sigu.pdf
 
Description of the project Purpose To implement a simple au.pdf
Description of the project Purpose To implement a simple au.pdfDescription of the project Purpose To implement a simple au.pdf
Description of the project Purpose To implement a simple au.pdf
 
Design Patterns Java An Internet Service Provider ISP no.pdf
Design Patterns Java  An Internet Service Provider ISP no.pdfDesign Patterns Java  An Internet Service Provider ISP no.pdf
Design Patterns Java An Internet Service Provider ISP no.pdf
 
Describe what you think the company is doing right in regard.pdf
Describe what you think the company is doing right in regard.pdfDescribe what you think the company is doing right in regard.pdf
Describe what you think the company is doing right in regard.pdf
 
Describe what is meant by a graded river At steady state i.pdf
Describe what is meant by a graded river At steady state i.pdfDescribe what is meant by a graded river At steady state i.pdf
Describe what is meant by a graded river At steady state i.pdf
 
Describe the properties of a neutron star Density Neutro.pdf
Describe the properties of a neutron star  Density Neutro.pdfDescribe the properties of a neutron star  Density Neutro.pdf
Describe the properties of a neutron star Density Neutro.pdf
 
Design a project document for a Ddos attack detection projec.pdf
Design a project document for a Ddos attack detection projec.pdfDesign a project document for a Ddos attack detection projec.pdf
Design a project document for a Ddos attack detection projec.pdf
 
Describe what a balance sheet tells about a business in your.pdf
Describe what a balance sheet tells about a business in your.pdfDescribe what a balance sheet tells about a business in your.pdf
Describe what a balance sheet tells about a business in your.pdf
 
Design a Data Base many to many each house can have many .pdf
Design a Data Base many to many each house can have many .pdfDesign a Data Base many to many each house can have many .pdf
Design a Data Base many to many each house can have many .pdf
 
Desea revisar las dependencias de tareas en su programa ante.pdf
Desea revisar las dependencias de tareas en su programa ante.pdfDesea revisar las dependencias de tareas en su programa ante.pdf
Desea revisar las dependencias de tareas en su programa ante.pdf
 
Desde una perspectiva muy bsica la respiracincombustin .pdf
Desde una perspectiva muy bsica la respiracincombustin .pdfDesde una perspectiva muy bsica la respiracincombustin .pdf
Desde una perspectiva muy bsica la respiracincombustin .pdf
 
Describe how Nanoporebased nucleic acid sequencing takes ad.pdf
Describe how Nanoporebased nucleic acid sequencing takes ad.pdfDescribe how Nanoporebased nucleic acid sequencing takes ad.pdf
Describe how Nanoporebased nucleic acid sequencing takes ad.pdf
 
Describe a time when you were able to achieve something that.pdf
Describe a time when you were able to achieve something that.pdfDescribe a time when you were able to achieve something that.pdf
Describe a time when you were able to achieve something that.pdf
 
Describe a leader with whom you are familiar You can choose.pdf
Describe a leader with whom you are familiar You can choose.pdfDescribe a leader with whom you are familiar You can choose.pdf
Describe a leader with whom you are familiar You can choose.pdf
 
Description 1 Imagine a young person recently graduated fr.pdf
Description 1 Imagine a young person recently graduated fr.pdfDescription 1 Imagine a young person recently graduated fr.pdf
Description 1 Imagine a young person recently graduated fr.pdf
 
Describe the two escalator model that economists Case and .pdf
Describe the two escalator model that economists Case and .pdfDescribe the two escalator model that economists Case and .pdf
Describe the two escalator model that economists Case and .pdf
 
Describir las caractersticas anatmicas craneales y poscran.pdf
Describir las caractersticas anatmicas craneales y poscran.pdfDescribir las caractersticas anatmicas craneales y poscran.pdf
Describir las caractersticas anatmicas craneales y poscran.pdf
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Description Find a cybersecurity incident that has recently .pdf

  • 1. Description Find a cybersecurity incident that has recently occurred and been published in the news. For the identified incident, determine the following characteristics: - Threat source - Threat event - Vulnerability exploited - Technical and business impact Learning outcomes being met through this assessment Identify the various characteristics of a risk Steps to complete the assignment 1. Read the description of the assignment in this document. 2. Select a recent cybersecurity incident found in the news. 3. For the identified incident, determine the following risk characteristics a. Threat source (or threat actor) b. Threat event c. Vulnerability exploited d. Technical and business impact 4. Document the selected cybersecurity incident (with reference) and the required characteristics in a Word document. 5 Correct identification of the risk characteristics