Select Page

UMUC Technological Advancements in Cybersecurity Essay

Question Description

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT. Your APT will be APT 38, aka, un-usual suspects. APT 38 is a financially motived North Korean regime-backed group.

Your part of the assignment will be:

Part 1: Introduction to APTs

Identify the problem to be solved.

Explain the significance of the issue or problem.

Part 2: Threat Landscape Analysis

Provide a detailed analysis of the threat landscape.

What has changed over the past year?

Describe common tactics, techniques, and procedures to include threat actor types.

What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Also, use additional sources of information but also describe the concept in layman’s terms and use visuals where appropriate.

Attached are two examples and a PDF of what APT 38 is.

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."

Order Solution Now