Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cybersecurity Threats and Mitigation Strategies: A Case Study of Raytheon Technologies, Assignments of Computer Security

This document examines cybersecurity threats facing raytheon technologies, a leading aerospace and defense company. It identifies internal and external threat actors, including disgruntled employees and advanced persistent threats (apts), and outlines mitigation strategies such as vulnerability scanning, penetration testing, access controls, and threat intelligence sharing. A practical example of cybersecurity challenges and solutions in a real-world context.

Typology: Assignments

2024/2025

Available from 02/21/2025

Milestonee
Milestonee 🇺🇸

4.4

(22)

3.5K documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Raytheon Technologies
Student Name
DeVry University
SEC572: Network
Security
By: Lanai
Alphonse
pf3
pf4
pf5
pf8

Partial preview of the text

Download Cybersecurity Threats and Mitigation Strategies: A Case Study of Raytheon Technologies and more Assignments Computer Security in PDF only on Docsity!

Raytheon Technologies Student Name DeVry University SEC572: Network Security By: Lanai Alphonse

Raytheon Technologies

  • Raytheon Technologies is a company that provides technology products and services to the aerospace and defense industries. Raytheon technology was established in 1922 and has evolved tremendously in the technology industry their strategy soon ventured into the defense industry and soared and plays a major role in the defense era of the military branches.

External Threat

Actor

Advance Persistent Threats (APTs) represents a sophisticated and persistent external threat to Raytheon Technologies. These attackers use advanced techniques to gain and maintain unauthorized access to the company’s network. Their primary goal is to steal sensitive data, intellectual property, or disrupt operations. The involvement Raytheon has in the defense and aerospace , APTs could target more critical projects, compromising national security and corporate integrity.

Mitigation

Strategies

  • Vulnerability scanning, penetration testing, and other security measures can help reduce and prevent the cause of comprised integrity and information of a company.
  • Access controls, monitoring and auditing, training and awareness for employees and a n incident response plan are all factors that help with internal threat actors.
  • Advance threat detections, network segmentation, regular security assessments , sharing of threat intelligence, and multi-factor authentication can add the extra layers od security for sensitive systems and data. Raytheon technologies can significantly bolster its security poster and protect it critical resources.

Implementation

cont’d

  • (^) Penetrating testing allows for simulated attacks on the system to identify the security gaps that a malicious actor could exploit.
  • Real-world attack simulation use the same techniques to identify and provide a real assessment of the organization defense. Examination of system and network configurations to ensure they allow security best practices and do not expose the organization to unnecessary risk.
  • Overall integrating these assessments, the security team can enhance the security posture of the organization in many ways to include proactive defense, informed decision making, continuous improvement, enhanced awareness, and much more.

References

  • (^) We Are RTX. (n.d.). Www.rtx.com. https:// www.rtx.com/who-we-are/we-are-rtx
  • (^) Britannica Money. (2024, April 3). Www.britannica.com. https:// www.britannica.com/money/Raytheon-Company
  • What is a threat actor? | Definition from TechTarget. (n.d.). WhatIs. Retrieved May 26, 2024, from https://www.techtarget.com/whatis/definition/threat- actor