Cyber security | ACC 564 Accounting Information Systems | Strayer University

 The answer will be checked for plagiarism. 

  1. Discuss OSINT, how it works, and its role in the realm of social engineering.
  2. Why is it difficult to detect fileless malware on a traditional anti-virus tool? Explain.
  3. What are the major ingredients which you would consider if you have been 
    tasked to develop an incident response (IR) plan from the scratch?
  4. What is Cyber Threat Intelligence (CTI)? Explain the difference between Cyber Threat Intelligence and Cyber Intelligence.
  5. What is SCDA security and what are the biggest security/risk concerns of these systems?

 The answer will be checked for plagiarism.