The Cybersecurity Threat Landscape.

Added on - 25 Sep 2019

  • 2

    Pages

  • 438

    Words

  • 104

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 1 of 2 pages
The Cybersecurity Threat LandscapeInstructions:Advanced Persistent Threats (APT) have been thrust into the spotlight due to their advanced tactics,techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.Your Chief Technology Officer (CTO) has formed groups of 5 people with the intent she will receive adetailed analysis and presentation on each APT. As a group, you will complete a report that includes thefollowing sections and information:•Provide a detailed analysis of the threat landscape in 2018. What has changed since 2017? Describecommon tactics, techniques, and procedures to include threat actor types. What are the exploit vectorsand vulnerabilities threat actors are predicted to take advantage of?◦Use additional sources of information but also describe the concept in layman terms.◦Use visuals where appropriate.•Provide a detailed analysis and description of the Advanced Persistent Threat (APT) your group wasassigned. Describe their specific tactics used to gain access to their target(s). Describe the tools used.Describe what the objective of the APT was/is. Were they successful?◦Use additional sources of information but also describe the concept in layman terms.◦Use visuals where appropriate.•Describe current hardware and software based cybersecurity tools, tactics, and procedures. Considerthe hardware and software solutions deployed today in the context of Defense in Depth. Elaborate onwhy these devices are not successful against the APTs?◦Use additional sources of information but also describe the concept in layman terms.◦Use visuals where appropriate.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document