Reference no: EM132820138
Question: 1. Research and select a cyberattack/cyber-incident in which one of the threat actors discussed was involved, provide link. Breakdown the motivation of this threat actor.
2. Select a phase of the SDLC and further breakdown its steps/criteria/goals/artifacts and so on.
3. Describe a generic threat model briefly. For example:
(a) Identify assets: website server, database, domain name
(b) Describe architecture: http/https requests and responses, business logic like SQL to communicate with database, web client to web server to data store communications
(c) Decompose application: database stores usernames/info/login process, lines of communication protocols, other technical aspects/functions possibly
(d) Identify threats: sql injection for login process, domain hijacking upon renewal, man-in-middle attack on unsecure communication, denial of service/distributed denial of service attacks on web servers
(e) Documents threats: (N/A for this discussion board, more of an actionable step to document the different threats)
(f) Rate threats: (rate on priority of the threats you listed, 1 being more severe) 1. denial of service attack/distributed denial of service attack, 2. sql injection 3. man-in-middle, 4. domain hijacking renewal
3 pages
What amount should ralph report as rental income
: Inducement to enter the lease, Ralph granted Wreck the first six months of the lease rent-free. What amount should Ralph report as rental income for 2018?
|
What is the required return on the stock
: What is the required return on the stock? Round the final answer to 2 decimal places.
|
What amount of lease income should be recognized by lomi
: Annual rental payment under the lease commencing in the third year is P500,000. What amount of lease income should be recognized by Lomi in the first year?
|
What is the npv for the project
: If the company requires a 11.5% return on investment, what is the NPV for the project? Round the final answer to 2 decimal places.
|
Describe a generic threat model briefly
: Describe a generic threat model briefly. For example: Identify assets: website server, database, domain name. Describe architecture: http/https requests.
|
What is addition to retained earnings
: If the company uses a residual dividend policy and declared total dividends of $44,000, what is its addition to retained earnings?
|
What amount of net rent revenue should be reported
: P10,000 transportation of the tractor to the lessee during the year. What amount of net rent revenue should be reported for the current year?
|
What amount is planned for total capital expenditures
: If the company uses a residual dividend policy and plans to borrow $200,000 in new debt, what amount is planned for total capital expenditures?
|
Evaluate the options for solving the problem
: Evaluate the options for solving the problem. Explain how you will implement the chosen solution and reflect on whether this option was the most effective.
|