fbpx

The Cybersecurity Threat Landscape Assignments | Online Homework Help

PLEASE READ ALL ASSIGNMENT REQUIREMENTS INCLUDING THE ATTACHED GRADING RUBRIC BEFORE AGREEING TO DO THE WORK. THANK YOU.

Don't use plagiarized sources. Get Your Assignment on
The Cybersecurity Threat Landscape Assignments | Online Homework Help
Just from $13/Page
Order Now

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

This is a team assignment, and the team members that were selected by the instructor in the previous assignment will work together. It is up to the team members to decide who is responsible for contributing to the sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections.

Note that you are required to complete a peer review for yourself and for each member of the team. The peer review template is provided in the Activities folder.

Your team’s report should use the Week 5 and 6 Assignment Template to cover the following five areas:

professional writing services near me

Part 1: Threat Landscape Analysis

o Provide a detailed analysis of the threat landscape in 2018.

o What has changed since 2017?

o Describe common tactics, techniques, and procedures to include threat actor types.

o What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Part 2: APT Analysis

o Provide detailed analysis and description of the APT your group was assigned. Describe the specific tactics used to gain access to the target(s).

o Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Part 3: Cybersecurity Tools, Tactics, and Procedures

o Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.

o Consider the hardware and software solutions deployed today in the context of defense-in-depth.

o Elaborate on why these devices are not successful against the APTs.

Part 4: Machine Learning and Data Analytics

o Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.

o Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?

Part 5: Using Machine Learning and Data Analytics to Prevent APT

o Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.

Notes

· Use additional sources of information but also describe the concept in layman’s terms.

· Use visuals where appropriate.

 

 

Competencies A B C D F
1.1: Create oral, written, or visual communications appropriate to the audience, purpose, and context. 4 points

Key Criteria: Tailors communication to purpose, context, and target audience. Clearly articulates the thesis and purpose, and supports the thesis and purpose with authentic and appropriate evidence. Provides smooth transitions and leaves no awkward gaps from point to point. Shows coherent progress from the introduction to the conclusion with no unnecessary sections.

3 points

Key Criteria: Tailors communication to purpose, context, and target audience. Articulates the thesis and purpose, and supports the thesis and purpose with authentic and appropriate evidence. Generally provides smooth transitions and leaves few awkward gaps from point to point. Shows identifiable progress from the introduction to the conclusion with no unnecessary sections.

2 points

Key Criteria: Considers the purpose, context, and target audience. Articulates the thesis and purpose, and shows some evidence supporting both. Some transitions are not smooth, and there are occasional gaps or awkward connections from point to point. There is a sense of progress from the introduction through the conclusion, but the organization may not be completely clear.

1 point

Key Criteria: Does not tailor communication well in terms of purpose, context, and target audience. Provides a weak thesis, unclear purpose, and little or no evidence to support points. Transitions may be rough or nonexistent, and there are significant gaps or connections between points that leave sections incomprehensible.  Progress from the introduction through the conclusion is difficult to decipher, and there may be some material that is unrelated to thesis and purpose.

0 points

Key Criteria: Does not tailor communication in terms of purpose, context, and target audience. Lacks a good thesis and has little or no evidence to support a thesis. Transitions are rough or nonexistent, and there are few discernable connections from point to point. There is no identifiable progress from the introduction through the conclusion, and/or there is substantial material that is unrelated to thesis and purpose.

1.2: Communicate using appropriate writing conventions, including spelling, grammar, mechanics, word choice, and format. 4 points

Uses a format that is highly appropriate to the writing task and carefully tailors the style and tone to the specific audience. Aligns both the writing style and grammar usage to standards appropriate to the task.

3 points

Uses a format that is appropriate to the writing task and tailors the style and tone to the specific audience. Aligns both the writing style and grammar usage to standards appropriate to the task.

2 points

Generally has a clear purpose, but there may be a gap between the format used and the writing task. Fails to fully align the style and tone to the audience, or fails to fully define the audience for the writing task. Has some style or grammar errors and may not be well aligned to standards appropriate to the task.

1 point

Lacks an appropriate format for the writing task and fails to align the style and tone, giving the sense that the audience for the writing task is not identified or misidentified. Features so many errors in writing style and grammar usage that communication is obscured.

 

0 points

Uses a completely inappropriate format for the writing task, or the intentional use of format is impossible to discern. The work fails to align with the task or identify the audience. Features so many egregious errors in writing style and grammar usage that there is little or no communication.

1.3: Incorporate credible and relevant sources in development and support of ideas. 4 points

Meaningfully supports, extends, and informs the author’s original thesis or idea using a variety of credible sources.  Evaluates information in the writing for credibility, bias, quality of evidence, and quality of reasoning, and smoothly integrates an appropriate balance of original content with supporting sources.

3 points

Supports, extends, and informs the author’s original thesis or idea using a number of credible sources. Evaluates information in the writing for credibility, bias, quality of evidence, and quality of reasoning, and integrates an appropriate balance of original content with supporting sources.

2 points

Uses sources to support and inform the author’s original thesis or idea, but some sources may not be fully credible or relevant. Lacks evidence that information has been evaluated for credibility, bias, quality of evidence, or quality of reasoning, and may not smoothly integrate sources in some places. Lacks an appropriate balance of original content with supporting sources.

1 point

Uses few sources to support and inform the author’s original thesis or idea, and the sources that are used may be irrelevant.  No evidence that source information has been evaluated for credibility, bias, quality of evidence, or quality of reasoning, and lacks smooth integration of sources. Substantially lacks balance of original content with supporting sources.

0 points

Lacks sources to support and inform the author’s thesis or idea. Fails to evaluate information for credibility, bias, quality of evidence, or quality of reasoning

1.4: Make clear the relationship between information obtained from others and content created by you, and attribute all sources ethically and legally. 4 points

Accurately and appropriately identifies sources and distinguishes them from original content. Conveys source content using summary, paraphrase, and quotes as most appropriate to the task, and maintains an excellent balance of each. Cites sources correctly in accordance with disciplinary conventions.

3 points

Identifies sources and distinguishes them from original content. Conveys source content using summary, paraphrase, and quotes as appropriate to the task, and generally maintains a balance of each. Generally cites sources correctly in accordance with disciplinary conventions, although there may be a few minor errors in citation style.

2 points

Makes an effort to distinguish between original content and sources, but there may be a few places where the distinction is unclear. Attempts to summarize, paraphrase, or use quotes as appropriate to the task, but there may be an overabundance or under use of quotes. Attempts to cite all sources correctly in accordance with disciplinary conventions, but there may be lapses or gaps in citation.

1 point

Fails to distinguish between original content and sources or the distinction is obscured. Uses few instances of summary, paraphrase, or direct quotes, and cited sources are substantially incorrect.

0 points

Fails to distinguish between original content and sources. Shows no effort to summarize, paraphrase, or quote material. Fails to cite sources, or cites sources that are not related to the work.

2.1: Identify and frame a problem or issue. 4 points

Accurately and thoroughly identifies and summarizes the problem, using supporting details. Thoroughly identifies potential underlying causes or conditions contributing to the issue or problem, and meaningfully and accurately considers the context. Integrates insightful, original, or well-formulated questions that inform the direction of the investigation of the problem or question. Includes information that is highly relevant to the issue or problem.

3 points

Identifies and summarizes the problem, using supporting details. Identifies potential underlying causes or conditions contributing to the issue or problem, and considers the context. Potential underlying causes or conditions contributing to the issue or problem are identified and the context is considered. Integrates questions that inform the direction of the investigation of the problem or question into the evaluation. Includes information that is highly relevant to the issue or problem.

2 points

Summarizes the issue or problem with some supporting details. Attempts to identify some potential underlying causes or conditions contributing to the issue or problem; the context is considered but may be lacking in thoroughness. Questions that inform the direction of the investigation of the problem or question are considered, although they may not be fully integrated into the evaluation. Includes information that is somewhat relevant to the issue or problem.

1 point

Attempts to summarize the issue or problem, but the work is weak and there are few, if any, supporting details. Barely touches upon underlying causes or conditions contributing to the issue or problem, and the context is not considered. Partially considers questions that inform the direction of the investigation of the problem or question. Lacks much relevant information.

0 points

Fails to identify the issue or problem is not identified and lacks supporting details. Fails to examine potential underlying causes or conditions contributing to the issue or problem, and context is not considered. Lacks questions that inform the direction of the investigation of the problem, and there is little or no evidence of gathering information.

2.2: Select evidence relevant to a problem or issue. 4 points

Provided details on how machine learning and data analytics applied to the APT assigned could have prevented or reduced the impact of the breach, according to criteria specified and provides supporting details.

3 points

Provided details on how machine learning and data analytics applied to the APT assigned could have prevented or reduced the impact of the breach, but does not provide all the facts.

2 points

Partially completes assignment; however unable to provide all the details.

1 point

Partially completes assignment; however contains significant mistakes.

0 points

No submission.

2.3: Evaluate the influence of context and assumptions on a problem or issue. 4 points

Presents a logical explanation for findings and addresses most of the questions. Uses correct grammar and spelling.

3 points

Presents a logical explanation for findings and addresses some of the questions. Only one or two grammatical or spelling errors.

2 points

Presents an illogical explanation for findings and addresses only a few of the proposed questions.

 

More than two grammatical or spelling errors.

1 point

Presents an illogical explanation for findings and does not address any of the questions.

 

Numerous grammatical and/or spelling errors.

0 points

No submission

2.4: Formulate and support conclusions on a problem or issue. 4 points

Work contains a reference list containing entries for all cited sources. Reference list entries and intext citations are correctly formatted using the appropriate IEEE style for each type of resource. The description appropriately used information from 3 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.

3 points

Work contains a reference list containing entries for all cited sources. One or two minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 3 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.

2 points

Work contains a reference list containing entries for all cited sources. No more than 5 minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 2 or more authoritative sources, i.e. journal articles, industry or trade

 

Work publications, news articles, industry or government white papers and authoritative Web sites.

1 point

Work contains a reference list containing entries for cited sources. Work contains no more than 5 minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 2 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.

0 points

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

 

The description appropriately used information from 0 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.

2.5: Assess the implications and consequences of particular conclusions. 4 points

Makes excellent use of information sources to increase familiarity on the topic and focus inquiry and seeks out additional information to apply it productively to the topic. Clearly identifies contradictory information or inconsistent data and strives to reconcile contradictions.

3 points

Makes good use of information sources to increase familiarity on the topic and focus inquiry and seeks out additional information to apply it to the problem. Identifies information or inconsistent data and tries to reconcile contradictions.

2 points

Attempts to use information sources to increase familiarity on the topic and tries to focus inquiry. Seeks additional information but leaves gaps in how that information was applied. Fails to fully reconcile contradictory information or inconsistent data.

1 point

Inadequately attempts to use information sources to increase familiarity on the topic and tries to focus inquiry. Includes numerous areas where contradictory information and inconsistent data that is not acknowledged. Includes numerous contradictions.

0 points

Fails to use information sources to increase familiarity on the topic or to focus inquiry. Fails to determine if gaps exist or to seek additional information to address gaps. Leaves contradictory information or inconsistent data may be clearly evident and fails to identify such issues or reconcile contradictions.

13.1.5: Explain the security implications of machine learning. 4 points

Clearly articulates the benefits and limitations of data analytics and machine learning to cybersecurity challenges.

 

Provides an in-depth explanation of how machine learning could have been applied to prevent the advanced persistent threat (APT) or minimize the impact.

 

Successfully analyzes the existing machine learning products that provide cutting-edge tools and techniques, and cybersecurity value to the organization.

3 points

Clearly articulates the benefits and limitations of data analytics and machine learning to cybersecurity challenges.

 

Analyzes how machine learning could have been applied to prevent the advanced persistent threat (APT) or minimize the impact.

 

Provides a description of the existing machine learning products that provide cutting-edge tools and techniques, and cybersecurity value to the organization.

2 points

Evaluates the benefits and limitations of data analytics and machine learning to cybersecurity challenges.

 

Explains how machine learning could have been applied to prevent the advanced persistent threat (APT) or minimize the impact.

 

Provides a limited description of the existing machine learning products that provide cutting-edge tools and techniques, and cybersecurity value to the organization

1 point

Attempts to explain the benefits and limitations of data analytics and machine learning to cybersecurity challenges.

 

Attempts to explain how machine learning could have been applied to prevent the advanced persistent threat (APT) or minimize the impact.

 

Does not provide a limited description of the existing machine learning products that provide cutting-edge tools and techniques, and cybersecurity value to the organization.

0 points

Does not evaluate the benefits and limitations of data analytics and machine learning to cybersecurity challenges.

 

Does not explain how machine learning could have been applied to prevent the advanced persistent threat (APT) or minimize the impact.

 

Does not provide a limited description of the existing machine learning products that provide cutting-edge tools and techniques, and cybersecurity value to the organization

 

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Homework Writing Services
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Business and administrative studies
Always use Grammarly Premium.
Customer 462795, April 3rd, 2022
Healthcare & Medical
Good content and organization.
Customer 452441, April 13th, 2022
SEO
Very nice content. I am glad you took the corrections to heart and made the changes. Commendable work.
Customer 463679, February 22nd, 2023
SEO
Well-structured. I can feel the writer did proper research before crafting this blog. Good job.
Customer 463679, February 15th, 2023
English 101
Excellent.
Customer 458101, April 23rd, 2022
Business and administrative studies
Good one
Customer 452615, July 16th, 2022
History
Extremely well written, perfect for what I needed
Customer 454393, May 21st, 2020
Military
Good job
Customer 456821, January 2nd, 2023
History
GOOD WORK.
Customer 463001, June 21st, 2022
Military
GOOD WORK.
Customer 456821, June 11th, 2022
Other
great job, thanks
Customer 462485, March 18th, 2022
Sociology
Excellent and fast work! Thanks!
Customer 454259, April 11th, 2020
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat