CYB_200_Project_Three_Victoria_Thibodeuax
docx
School
CUNY John Jay College of Criminal Justice *
*We aren’t endorsed by this school
Course
MISC
Subject
Mechanical Engineering
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by VET0003
Victoria Thibodeaux
CYB - 200
Southern New Hampshire University
Maria Hamilton
Technical Brief: Proactive Adversarial Detection Plan
Introduction:
As the designated Security Analyst for our organization, I am addressing a critical incident involving threat actors and providing insights into the larger proactive adversarial detection plan.
In this scenario, our organization faces a threat from sophisticated adversaries seeking financial gain through information gathering.
Analysis:
Detecting Threat Actors:
We must employ a multi-faceted approach to detect the threat actors outlined in the scenario effectively. Leveraging threat intelligence feeds and implementing anomaly detection systems can help identify unusual patterns or behaviors indicative of malicious activity. Additionally, continuously monitoring network traffic and endpoint logs using Security Information and Event Management (SIEM) tools can enhance our ability to spot deviations from the norm.
Ethical and Legal Factors:
Ethical considerations play a pivotal role in our defensive strategy. We must ensure our detection
methods adhere to legal standards and privacy regulations. Collaborating with legal experts to establish a robust data collection and analysis framework is crucial. Transparency with employees about monitoring practices is essential to maintain ethical standards and foster a culture of trust within the organization.
Counteracting Threat Actors:
In responding to the identified threat actors, it is imperative to deploy incident response teams promptly. Rapid containment and eradication of the threat can minimize potential damage. Employing threat-hunting techniques, such as examining historical data for signs of compromise,
can aid in identifying the root cause and preventing future incidents.
Preventive Measures:
Implementing a robust access control strategy is essential to reduce the likelihood of a recurrence. Regularly updating and patching systems, conducting security awareness training for employees, and employing endpoint protection solutions are effective preventive measures. Continuous penetration testing and vulnerability assessments can identify and address potential weaknesses in our security posture.
Conclusion:
The suggested tactics and methods aim to fortify our organization's defenses against the identified threat actors. However, it's essential to acknowledge the potential ramifications of
these actions. While detection and response measures enhance our security, they may also introduce operational disruptions and resource constraints. Striking a balance between safety and
business continuity is critical.
Additionally, continuous adaptation to emerging threats is paramount. Threat actors evolve, and so must our defensive strategies. Regularly updating the proactive adversarial detection plan based on threat intelligence and industry best practices ensures our organization remains resilient
despite evolving cybersecurity challenges.
In conclusion, robust detection measures, ethical considerations, swift response tactics, and preventive strategies form a comprehensive, proactive adversarial detection plan. This approach safeguards our organization's assets and establishes a resilient security posture capable of withstanding the dynamic landscape of cyber threats.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Related Questions
Assume that a security model is needed to protect information used in the class you aretaking—say, the information in your course’s learning management system. Use the
CNSS model to identify each of the 27 cells needed for complete information protec-tion. Write a brief statement that explains how you would address the components
represented in each of the 27 cells.
arrow_forward
Technical graphics are the preferred method for communicating designs during a
design process.
True
False
arrow_forward
Test 1 .DOCX * A
File Edit View
Tools Help
INDUSTRIAL ENGINEERING PROGRAMME
IMB 411-INDUSTRIAL LOGISTICS
TEST 1- SEPTEMBER 12, 2012
Instructions: Answer all questions. Time allowed is 1.5 hours. Identify your script with your
student number ONLY (Do not write your name).
1. Define the following terms
(i) Logistics management
(ii) Supply chain management
(iii) Vertical integration in a supply chain
(3 Marks)
(3 Marks)
(3 Marks)
2. (a) Using examples of your choice, briefly discuss the following levels of customer
service
(1) Pre-transaction elements
(ii) Transaction elements
(4 Marks)
(4 Marks)
(iii) Post-transaction elements
(4 Marks)
(b) "The challenge facing Dumelang Enterprise (Pty) Ltd is to establish the real
profitability of their customers and to develop service strategies that will improve the
profitability of all customers". As a logistics consultant, briefly discuss how you can
advise Dumelang's customer service management.
3. (a) List the three main forms of inventory in a…
arrow_forward
Sensor systems for obstacle detection and avoidance in mobile robots.
• Produce a written report documenting: the choice of sensors, sensor evaluation, the developed processor/measurement system, and overall system performance.
arrow_forward
Assignment 1: Killer Robot
Summary of the case: Bart Matthews, a robot operator at Cybernetics, Inc., has been killed by an out-
of-control robot named Robbie. The creator of the robot, Silicon Technologies, is also in a tight
financial position and had hoped that the robot would put the company back on its feet. It has been
determined that several situations contributed to the death of Matthews:
1. Improper methodology was used in developing the software.
2. Testing of the software was faked.
3. The company pressured Robbie's creators to by-pass testing.
4. Part of the software used in the robot was stolen from another vendor's application.
5. The programmer did not understand or know the code which he used.
6. Security measures used were illegal, and therefore all information gathered in regard to the case
might not be permissible in court.
7. The project leader did not understand or use proper design methodologies.
8. The end-user interface was designed improperly.
Questions for…
arrow_forward
I want to briefly summarize what he is talking about and what you conclude.
pls very urgent
arrow_forward
• Characterize and evaluate the sensor performance use real data already collected or extrapolated information from the sensor datasheets.
• Produce a written report documenting: the choice of sensors, sensor evaluation, the developed processor/measurement system, and overall system performance.
arrow_forward
Sensor systems for obstacle detection and avoidance in mobile robots.
• Design and develop a suitable processor-based Data Acquisition (DAQ) system and external hardware to interface, measure, display and store the responses from the selected sensors.
• Characterize and evaluate the sensor performance use real data already collected or extrapolated information from the sensor datasheets.
arrow_forward
The rapid progress of engineering design and information technology has caused difficulties in analyzing system reliability. Because of the increased complexity in system reliability structure (component/subsystem interfaces), many unexpected failure modes could occur, and their behaviors are interdependent. At a system’s design and development stage, the main challenge in analyzing a complex system is the failure uncertainty introduced by the incomplete knowledge of the system. This makes it hard to decompose system reliability into subsystem/component reliability in a deterministic manner, such as series or parallel systems. As a result, some common reliability analysis tools such as fault tree (FT) and reliability block diagram (RBD) become inadequate. Do you agree, why or why not? Are there any other approaches to system reliability assessment beside these tools at the early system’s design and development stage (what are these approaches)?
arrow_forward
Sensor systems for obstacle detection and avoidance in mobile robots.
• Design and develop a suitable processor-based Data Acquisition (DAQ) system and external hardware to interface, measure, display and store the responses from the selected sensors.
arrow_forward
Please do not copy other's work and do not use ChatGPT or Gpt4,i will be very very very appreciate!!!
Thanks a lot!!!!!
arrow_forward
(b) A special sprinkler system is comprised of three identical humidity sensors,
a digital controller, and a pump, of which the reliability is 0.916, 0.965, and
0.983 respectively. The system configuration is shown in the figure below.
Sensor
Controller
Pump
Reliability block diagram of a sprinkler system.
(b) Calculate the reliability of the sprinkler system.
(c) Discuss the importance of safety in an engineering maintenance.
arrow_forward
Problem 3: A small gearing system in your brand-new 3D printer fails as you were printing,
leading to an overload in the motor and a fire in your home. The fire spreads, burning half of
Everglades National Park in the worst environmental disaster in US history.
The printer company blames you! Stating that you must have been misusing the printer some-
how. Use your engineering knowledge to "show those jerks you mean business!"
You investigate and find a serial number on the gears and type it into Google, finding the
company that manufactures the gears. Their website provides some info that this series of gear is
made from AISI 4340 steel and the yield strength is 125 kpsi.
Assuming each gear tooth acts as a small cantilever, prove to the 3D printer company that they
are liable for the fire.
oct
#
Gear Information
Gear radius (r): 1.00 in
Tooth length (1): 0.15 in
Tooth height (h): 0.15 in
Tooth thickness (b): 0.1 in
Angular velocity (w): 0.1 rad/s
Motor Information
Power (H): 0.009 hp
1…
arrow_forward
Problem 1: You are working in a consulting company that does a lot of hand calculations for designs in
Aerospace Industry for mechanical, thermal, and fluidic systems. You took the Virtual engineering
course, and you want to convince your boss and the team you work to move to modelling and simulation
in computers using a certain software (Ansys, Abaqus, etc). Discuss the benefits and pitfalls of computer
based models used within an industrial environment to solve problems in engineering.
arrow_forward
Task 1
You are employed as a mechanical engineer within an unnamed research center, specializing in the
development of innovative air conditioning systems. Your division is tasked with providing computer-based
modeling and design solutions using computational fluid dynamics through ANSYS software. Your primary
responsibilities involve the analysis of horizontal channel dynamics to meet specific criteria. Under the
guidance of your immediate supervisor, you have been assigned unique responsibilities within an ongoing
project. As a member of the research team, your role includes constructing an appropriate model and
executing a sequence of simulation iterations to explore and enhance channel performance. Figure 1
provides a visualization of the horizontal channel under consideration. Consider 2D, incompressible, steady
flow in a horizontal channel at a Reynolds number of 150. The schematic below illustrates the channel flow,
not drawn to scale. For simplicity, neglect gravity. The…
arrow_forward
After creating a decision matrix for two types of materials used to design a safety belt, an engineer assigns a weight of 4 to nylon for thickness and a weight of 5 to polyester for thickness. The engineer also assigns a weight of 4 to nylon for strength and a weight of 3 to polyester for strength. Polyester is more expensive than nylon. Describe which material would be preferable to use for the safety belt, if cost is prioritized as a criterion
arrow_forward
Engineering project
Explore alternative methods to monitor and meet project milestones, justify selection of chosen method(s).
arrow_forward
Subject: Air Pollution Formation and Control
Do not just copy and paster other online answers
arrow_forward
I need help solving this problem.
arrow_forward
Based on the Ball Point Pen Factory simulation: Which of the barriers shown below is
positioned correctly?
Great 10
9
Difficulty of removal
3
B
2
7
6
5
す
4
3
2
1
5
small
0
0 1 2
small
3 4
5
6
7 8
9
10
Impact on cycle time and quality
great
Barrier 1
Barrier 2
Barrier 3
Barrier 4
Barrier 5
Legend:
1 External supply - poor quality parts
2 Worker idle and non-productive time
3 Unnecessary supply forms within factory
4 Factory lighting
5 Transparent order management
arrow_forward
Using signavio or any PBM tools and must Use pool and lane and object.
Model the following business process at a supplier. After a supplier notifies a retailer of the approval of a purchase order, the supplier can receive an order confirmation, an order change, or an order cancelation from the retailer. It may happen that no response is received at all. If no response is received after 48 h, or if an order cancelation is received, the supplier will cancel the order. If an order confirmation is received within 48 h, the supplier will process the order normally. If an order change is received within 48 h, the supplier will update the order and ask again the retailer for confirmation. The retailer is allowed to change an order at most three times. Afterwards, the supplier will automatically cancel the order.
arrow_forward
"Design and Fabrication of an Agricultural Spraying Attachment foran Autonomous Rover"we need help in the machine design part of our study, specifically Pump selection, batteryselection, and center of gravity computation.
Rover weight capacity 35 kilo grams (payload)Rover measurements:Wheel distance - 14.5 inches and 8.5 inchesRover platform size (width & length) 14.4 inches x 10.4 inchesHeight- 15.8 inches.
....help it
arrow_forward
I want to answer all the questions by handwriting.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Elements Of Electromagnetics
Mechanical Engineering
ISBN:9780190698614
Author:Sadiku, Matthew N. O.
Publisher:Oxford University Press

Mechanics of Materials (10th Edition)
Mechanical Engineering
ISBN:9780134319650
Author:Russell C. Hibbeler
Publisher:PEARSON

Thermodynamics: An Engineering Approach
Mechanical Engineering
ISBN:9781259822674
Author:Yunus A. Cengel Dr., Michael A. Boles
Publisher:McGraw-Hill Education

Control Systems Engineering
Mechanical Engineering
ISBN:9781118170519
Author:Norman S. Nise
Publisher:WILEY

Mechanics of Materials (MindTap Course List)
Mechanical Engineering
ISBN:9781337093347
Author:Barry J. Goodno, James M. Gere
Publisher:Cengage Learning

Engineering Mechanics: Statics
Mechanical Engineering
ISBN:9781118807330
Author:James L. Meriam, L. G. Kraige, J. N. Bolton
Publisher:WILEY
Related Questions
- Assume that a security model is needed to protect information used in the class you aretaking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protec-tion. Write a brief statement that explains how you would address the components represented in each of the 27 cells.arrow_forwardTechnical graphics are the preferred method for communicating designs during a design process. True Falsearrow_forwardTest 1 .DOCX * A File Edit View Tools Help INDUSTRIAL ENGINEERING PROGRAMME IMB 411-INDUSTRIAL LOGISTICS TEST 1- SEPTEMBER 12, 2012 Instructions: Answer all questions. Time allowed is 1.5 hours. Identify your script with your student number ONLY (Do not write your name). 1. Define the following terms (i) Logistics management (ii) Supply chain management (iii) Vertical integration in a supply chain (3 Marks) (3 Marks) (3 Marks) 2. (a) Using examples of your choice, briefly discuss the following levels of customer service (1) Pre-transaction elements (ii) Transaction elements (4 Marks) (4 Marks) (iii) Post-transaction elements (4 Marks) (b) "The challenge facing Dumelang Enterprise (Pty) Ltd is to establish the real profitability of their customers and to develop service strategies that will improve the profitability of all customers". As a logistics consultant, briefly discuss how you can advise Dumelang's customer service management. 3. (a) List the three main forms of inventory in a…arrow_forward
- Sensor systems for obstacle detection and avoidance in mobile robots. • Produce a written report documenting: the choice of sensors, sensor evaluation, the developed processor/measurement system, and overall system performance.arrow_forwardAssignment 1: Killer Robot Summary of the case: Bart Matthews, a robot operator at Cybernetics, Inc., has been killed by an out- of-control robot named Robbie. The creator of the robot, Silicon Technologies, is also in a tight financial position and had hoped that the robot would put the company back on its feet. It has been determined that several situations contributed to the death of Matthews: 1. Improper methodology was used in developing the software. 2. Testing of the software was faked. 3. The company pressured Robbie's creators to by-pass testing. 4. Part of the software used in the robot was stolen from another vendor's application. 5. The programmer did not understand or know the code which he used. 6. Security measures used were illegal, and therefore all information gathered in regard to the case might not be permissible in court. 7. The project leader did not understand or use proper design methodologies. 8. The end-user interface was designed improperly. Questions for…arrow_forwardI want to briefly summarize what he is talking about and what you conclude. pls very urgentarrow_forward
- • Characterize and evaluate the sensor performance use real data already collected or extrapolated information from the sensor datasheets. • Produce a written report documenting: the choice of sensors, sensor evaluation, the developed processor/measurement system, and overall system performance.arrow_forwardSensor systems for obstacle detection and avoidance in mobile robots. • Design and develop a suitable processor-based Data Acquisition (DAQ) system and external hardware to interface, measure, display and store the responses from the selected sensors. • Characterize and evaluate the sensor performance use real data already collected or extrapolated information from the sensor datasheets.arrow_forwardThe rapid progress of engineering design and information technology has caused difficulties in analyzing system reliability. Because of the increased complexity in system reliability structure (component/subsystem interfaces), many unexpected failure modes could occur, and their behaviors are interdependent. At a system’s design and development stage, the main challenge in analyzing a complex system is the failure uncertainty introduced by the incomplete knowledge of the system. This makes it hard to decompose system reliability into subsystem/component reliability in a deterministic manner, such as series or parallel systems. As a result, some common reliability analysis tools such as fault tree (FT) and reliability block diagram (RBD) become inadequate. Do you agree, why or why not? Are there any other approaches to system reliability assessment beside these tools at the early system’s design and development stage (what are these approaches)?arrow_forward
- Sensor systems for obstacle detection and avoidance in mobile robots. • Design and develop a suitable processor-based Data Acquisition (DAQ) system and external hardware to interface, measure, display and store the responses from the selected sensors.arrow_forwardPlease do not copy other's work and do not use ChatGPT or Gpt4,i will be very very very appreciate!!! Thanks a lot!!!!!arrow_forward(b) A special sprinkler system is comprised of three identical humidity sensors, a digital controller, and a pump, of which the reliability is 0.916, 0.965, and 0.983 respectively. The system configuration is shown in the figure below. Sensor Controller Pump Reliability block diagram of a sprinkler system. (b) Calculate the reliability of the sprinkler system. (c) Discuss the importance of safety in an engineering maintenance.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Elements Of ElectromagneticsMechanical EngineeringISBN:9780190698614Author:Sadiku, Matthew N. O.Publisher:Oxford University PressMechanics of Materials (10th Edition)Mechanical EngineeringISBN:9780134319650Author:Russell C. HibbelerPublisher:PEARSONThermodynamics: An Engineering ApproachMechanical EngineeringISBN:9781259822674Author:Yunus A. Cengel Dr., Michael A. BolesPublisher:McGraw-Hill Education
- Control Systems EngineeringMechanical EngineeringISBN:9781118170519Author:Norman S. NisePublisher:WILEYMechanics of Materials (MindTap Course List)Mechanical EngineeringISBN:9781337093347Author:Barry J. Goodno, James M. GerePublisher:Cengage LearningEngineering Mechanics: StaticsMechanical EngineeringISBN:9781118807330Author:James L. Meriam, L. G. Kraige, J. N. BoltonPublisher:WILEY

Elements Of Electromagnetics
Mechanical Engineering
ISBN:9780190698614
Author:Sadiku, Matthew N. O.
Publisher:Oxford University Press

Mechanics of Materials (10th Edition)
Mechanical Engineering
ISBN:9780134319650
Author:Russell C. Hibbeler
Publisher:PEARSON

Thermodynamics: An Engineering Approach
Mechanical Engineering
ISBN:9781259822674
Author:Yunus A. Cengel Dr., Michael A. Boles
Publisher:McGraw-Hill Education

Control Systems Engineering
Mechanical Engineering
ISBN:9781118170519
Author:Norman S. Nise
Publisher:WILEY

Mechanics of Materials (MindTap Course List)
Mechanical Engineering
ISBN:9781337093347
Author:Barry J. Goodno, James M. Gere
Publisher:Cengage Learning

Engineering Mechanics: Statics
Mechanical Engineering
ISBN:9781118807330
Author:James L. Meriam, L. G. Kraige, J. N. Bolton
Publisher:WILEY