Cybersecurity Threat Landscape, APTs, and Machine Learning

Verified

Added on  2019/09/26

|2
|438
|320
Report
AI Summary
This report provides a comprehensive analysis of the cybersecurity threat landscape, focusing on Advanced Persistent Threats (APTs) and the application of machine learning and data analytics. It begins with an overview of the current threat landscape, including changes since 2017, common tactics, techniques, and procedures, and exploit vectors. The report then delves into a specific APT, detailing their tactics, tools, and objectives. It evaluates current cybersecurity tools and their limitations against APTs, followed by an exploration of machine learning and data analytics in cybersecurity, including innovative companies and recommendations for a CTO. Finally, the report assesses how machine learning could have detected and prevented the analyzed APT, providing specific examples. The report aims to provide a detailed understanding of cybersecurity threats and the potential of advanced technologies in mitigating them.
Document Page
The Cybersecurity Threat Landscape
Instructions:
Advanced Persistent Threats (APT) have been thrust into the spotlight due to their advanced tactics,
techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.
Your Chief Technology Officer (CTO) has formed groups of 5 people with the intent she will receive a
detailed analysis and presentation on each APT. As a group, you will complete a report that includes the
following sections and information:
•Provide a detailed analysis of the threat landscape in 2018. What has changed since 2017? Describe
common tactics, techniques, and procedures to include threat actor types. What are the exploit vectors
and vulnerabilities threat actors are predicted to take advantage of?
◦Use additional sources of information but also describe the concept in layman terms.
◦Use visuals where appropriate.
•Provide a detailed analysis and description of the Advanced Persistent Threat (APT) your group was
assigned. Describe their specific tactics used to gain access to their target(s). Describe the tools used.
Describe what the objective of the APT was/is. Were they successful?
◦Use additional sources of information but also describe the concept in layman terms.
◦Use visuals where appropriate.
•Describe current hardware and software based cybersecurity tools, tactics, and procedures. Consider
the hardware and software solutions deployed today in the context of Defense in Depth. Elaborate on
why these devices are not successful against the APTs?
◦Use additional sources of information but also describe the concept in layman terms.
◦Use visuals where appropriate.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
•Describe the concepts of machine learning and data analytics and how applying them to cybersecurity
will evolve the field. Are there companies providing innovative defensive cybersecurity measures based
on these technologies? If so, what are they. Would you recommend any of these to the CTO?
◦Use additional sources of information but also describe the concept in layman terms.
◦Use visuals where appropriate.
•Describe how machine learning and data analytics could have detected and/or prevented the APT you
analyzed had the victim organization deployed these technologies at the time of the event. Be specific.
◦Use additional sources of information but also describe the concept in layman terms.
◦Use visuals where appropriate.
To complete the assignment:
•While quality is valued over quantity, it is expected that a quality paper will result in a minimum length
of 10 - 15 pages.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]