Search for question
Question

Before you respond to this discussion, review the YouTube video, "What is the Cyber Kill

Chain?" in the Readings and Instructional Material section of Week 5.

• How can you apply the concepts from this video as part of an overall

cybersecurity and cyber resilience strategy?

• What processes, tools, and techniques do you think would be effective to

discover and disrupt a cyber-attack while it's underway?

This week's chapter of the course textbook focuses on threats, vulnerabilities, and the management

processes needed to address them within the cybersecurity and cyber resilience strategy. Chapter 4

Cyber Threats, Vulnerabilities and Intelligence Analysis (Siegel and Sweeney 2020)

https://www.youtube.com/watch?v=zhClg4cLemc%20