Executive summary – computer security

1- download and read “Internet Security Threat Report (ISTR)” from the attachment.

2- Choose one​ of the primary sections of the ISTR to read and study thoroughly:

 ○ The Cyber Crime Threat Landscape 

○ Targeted Attacks by Numbers 

○ Ransomware: More than Just Cyber Crime 

○ Infecting the Software Supply Chain 

○ The Mobile Threat Landscape

3- Create an Executive Summary document of the single ISTR section chosen above.

4- The maximum length of the document must be two pages or less.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>