Advanced Persistent Threats (APT) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors. Your Chief Technology Officer (CTO) has formed groups of 5 people with the intent she will receive a detailed analysis and presentation on each APT. You will need to complete a report that includes the following sections and information:

  • Provide a detailed analysis of the threat landscape in 2018. What has changed since 2017? Describe common tactics, techniques, and procedures to include threat actor types. What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of.
    • Use additional sources of information but also describe the concept in layman terms.
    • Use visuals where appropriate.
  • Provide a detailed analysis and description of the Advanced Persistent Threat (APT) your group was assigned. Describe their specific tactics used to gain access to their target(s). Describe the tools used. Describe what the objective of the APT was/is. Were they successful?
    • Use additional sources of information but also describe the concept in layman terms.
    • Use visuals where appropriate.
  • Describe current hardware and software based cybersecurity tools, tactics, and procedures. Consider the hardware and software solutions deployed today in the context of Defense in Depth. Elaborate on why these devices are not successful against the APTs?
    • Use additional sources of information but also describe the concept in layman terms.
    • Use visuals where appropriate.
  • Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field. Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they. Would you recommend any of these to the CTO?
    • Use additional sources of information but also describe the concept in layman terms.
    • Use visuals where appropriate.
  • Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.
    • Use additional sources of information but also describe the concept in layman terms.
    • Use visuals where appropriate.

To complete the assignment:

  • While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10 – 15 pages. Answer the questions and embed the appropriate screenshots of your cloud infrastructure provision.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now