Ashford University Cyber Security Threat & Advanced Persistent Threats Paper Advanced persistent threats (APTs) have been thrust into the spotlight due to

Ashford University Cyber Security Threat & Advanced Persistent Threats Paper Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

Part 1: Threat Landscape Analysis

Describe common tactics, techniques, and procedures to include threat actor types.

Part 3: Cybersecurity Tools, Tactics, and Procedures

Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
Consider the hardware and software solutions deployed today in the context of defense-in-depth.
Elaborate on why these devices are not successful against the APTs.

Notes

Use additional sources of information but also describe the concept in layman’s terms.
Use visuals where appropriate.
While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 2 to 3 pages.

Leave a Reply

Your email address will not be published. Required fields are marked *