01 - Threat Environment
Example In the News Item
macOS malware used run-only AppleScripts to avoid detection for five years | ZDNet
Two things stuck with me in this article. First, that the malware had abound for five years. Second, that the technique used is not that complicated. Basically a fairly simple nested obfuscation.
Week 1 Presentation
Boyle and Panko: Chapter 1 “The Threat Environment”
Post your thoughtful analysis about one key point you took from this assigned reading. (This first week you are not required to post: One question to ask your fellow classmates to facilitate discussion, nor are required to post In The News nor comment on other students’ postings.)
Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”
Post your thoughtful analysis about one key point you took from this assigned reading.