Blog
Advanced persistent threats (APTs) have been thrust into the spotlight due to
Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.
Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of APT 28, which she will assign to the team
Section 1: Using Machine Learning and Data Analytics to Prevent APT
Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific
Section 2: Ethics in Cybersecurity
Do you think the vulnerability(ies) exploited by the APT constitute an ethical failure by the defender? Why or why not?
For the APT your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A? If not, what ethically significant harms could result from the scenario your group researched?
For the APT your group studied, when the targeted organization identified the breach, was the disclosure made with transparency? Do you feel the organization acted ethically? Why or why not?
Notes
Use additional sources of information but also describe the concept in layman’s terms.
Use visuals where appropriate.
2 page minimum per Section.
