Skip to content
Home » The Cybersecurity Threat Landscape

The Cybersecurity Threat Landscape

 
 
 
 
The Cybersecurity Threat Landscape 
Group Assignment
 
 
CMIT 495: Current Trends and Projects in Computer Networks and Security
 
 
[PROFESSOR NAME]
 
By:
 
 
Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.  You will be working on APT30 
 
Introduction 
 
 
Part 1: Threat Landscape Analysis 
 
o Provide a detailed analysis of the threat landscape.
o What has changed over the past year?
o Describe common tactics, techniques, and procedures to include threat actor types.
o What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?
 
Part 2: APT Analysis 
 
o Provide a detailed analysis and description of the APT your group was assigned. Describe the specific tactics used to gain access to the target(s).
o Describe the tools used. Describe what the objective of the APT was/is. Was it successful?
 
Part 3: Cybersecurity Tools, Tactics, and Procedures 
 
o Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
o Consider the hardware and software solutions deployed today in the context of defense-in-depth.
o Elaborate on why these devices are not successful against the APTs.
 
Part 4: Machine Learning and Data Analytics 
 
o Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
o Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?
 
Part 5: Using Machine Learning and Data Analytics to Prevent APT
 
o Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.
 
 
Part 6: Ethics in Cybersecurity
 
o Do you think the vulnerability(ies) exploited by the APT constitute an ethical failure by the defender? Why or why not?
 
o For the APT your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A? If not, what ethically significant harms could result from the scenario your group researched?
 
o For the APT your group studied, when the targeted organization identified the breach, was the disclosure made with transparency? Do you feel the organization acted ethically? Why or why not?
 
 
Conclusion
 
 
References
 

Interested in getting help with this assignment?
Get a professional writing team to work on your assignment!
Order Now
Recent postsFor this final assignment, you will prepare a brief paper detailing the steps undertaken to complete a presentation that disseminates information you assemble
Please choose to answer only one of the 2 following questions. Option 1: In your opinion and based on scientific, peer-reviewed published evidence, does child
At the beginning of the previous academic year, the institution announced it would drop football at the conclusion of the season. The announcement created pub
you will review current research in Personality and provide a critical evaluation of that personality research through an annotated bibliography. An annotated
In Module 5, we considered the third in our three-part series on research design. Specifically, the focus was on the longitudinal studies, in which the resear

Need help with a similar or different Task?

We have the best writers to help you. Hire Writer Now

ORDER NOW