Executive summary – computer security

1- download and read “Internet Security Threat Report (ISTR)” from the attachment.

2- Choose one​ of the primary sections of the ISTR to read and study thoroughly:

 ○ The Cyber Crime Threat Landscape 

○ Targeted Attacks by Numbers 

○ Ransomware: More than Just Cyber Crime 

○ Infecting the Software Supply Chain 

○ The Mobile Threat Landscape

3- Create an Executive Summary document of the single ISTR section chosen above.

4- The maximum length of the document must be two pages or less.