Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 6: Types of Cybersecurity Threats!

Instruction

6.4.2. Investigation

We calculated the cyber-attack score based on the Open Source Intelligence (OSINT) method. Many cybersecurity companies publish analyses of cyber-attack cases, and certain countries, such as the United States and South Korea, publish reports with analyses of cyber-attacks. We analyzed these reports to identify the techniques that were used by the cyber-attack groups.

To identify detailed tec...