logo

Cybersecurity Threat Landscape Analysis

   

Added on  2019-09-26

2 Pages438 Words320 Views
 | 
 | 
 | 
The Cybersecurity Threat LandscapeInstructions: Advanced Persistent Threats (APT) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors. Your Chief Technology Officer (CTO) has formed groups of 5 people with the intent she will receive a detailed analysis and presentation on each APT. As a group, you will complete a report that includes thefollowing sections and information:•Provide a detailed analysis of the threat landscape in 2018. What has changed since 2017? Describe common tactics, techniques, and procedures to include threat actor types. What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?◦Use additional sources of information but also describe the concept in layman terms.◦Use visuals where appropriate.•Provide a detailed analysis and description of the Advanced Persistent Threat (APT) your group was assigned. Describe their specific tactics used to gain access to their target(s). Describe the tools used. Describe what the objective of the APT was/is. Were they successful?◦Use additional sources of information but also describe the concept in layman terms.◦Use visuals where appropriate.•Describe current hardware and software based cybersecurity tools, tactics, and procedures. Consider the hardware and software solutions deployed today in the context of Defense in Depth. Elaborate on why these devices are not successful against the APTs? ◦Use additional sources of information but also describe the concept in layman terms.◦Use visuals where appropriate.
Cybersecurity Threat Landscape Analysis_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Revolutionizing Network Architecture with SDN and IBN
|3
|845
|324