Explain each of the below segments in 2-3 sentences per topic. Submit the response as an APA6-formatted report (reports not in this format will lose 50% of the grade)
1. Measure Security Posture
· a. Current threat landscape
· b. Cybersecurity challenges
· c. Enhance Security Posture
· d. Red and Blue Team
2. Planning for incident response
· a. Process
· b. Handling an incident
· c. Post-incident analysis
3. Understanding the cybersecurity Kill Chain
· a. External recon
· b. Access and privilege escalation
· c. Exfiltration
· d. Sustainment
· e. Assault
· f. Obfuscation
· g. Threat life cycle management
4. Recon
· a. External
· b. Internal
5. System compromise
· a. Phishing
· b. Exploiting vulnerabilities
· c. Planned attack
· d. Identity compromise
· e. Lateral movement
6. Security policy
· a. Creation
· b. Review
· c. Update
7. Network segmentation
· a. Defense in depth
· b. User awareness and education
· c. Physical network segmentation
· d. VPN
8. Threat intelligence
9. Recovery
· a. Disaster recovery plan
· b. Contingency plans
10. Vulnerability Management
11. Log Analysis
12. Risk management
13. Compliance management
14. Governance