Description
The scenario includes looking for attack vectors against a “fictitious” conference of the Five eye countries. In this paper you will write about the importance of defending the international Five eye conference against the following attack vectors, and you will provide recommendations for mitigating or eliminating risk to these attacks: Malware, ransomware, and APT (Advanced Persistent Threat) campaigns that target devices ranging from traditional laptops and servers to networking gear and VPN appliances. Also, include firmware cyberattacks. Firmware cyberattacks article here: