Overview
Since you did such a superb job in mitigating attacks from nefarious foreign actors, the joint task force has asked for your assistance once again with a new issue. They have asked you to assist in hardening their systems to withstand cyberattacks that nation-state actors may conduct on national soil or to protect them if for some other reason their network security controls are compromised. Based on what you have learned thus far, suggest other threat vectors and what controls could be used to further mitigate those threats.
Write a 3–4 page report in which you answer the following:
Evaluate the threat posed by viruses, malicious code, and virus hoaxes, and the extent of their effect on computers and productivity.
Analyze denial of service attacks and blended threats.
Analyze the operation of a Trojan horse and how it is different from a standard virus.
Analyze two threat vectors and what controls could be used in order to further mitigate those threats.