Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.
Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.
Answer the following:
1. Provide a detailed analysis of the threat landscape in 2018.
2. What has changed since 2017?
3. Describe common tactics, techniques, and procedures to include threat actor types.
3. What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?
Since the introduction of internet, many problems of insecurity has been experienced in firms, organizations and even individual basis. In the recent times, Advanced Persistent Threat (APTs) has been reported tremendously. In this paper, a detailed analysis of the resultant threat landscape is discussed, along with the advantages that the threat causers are often taking advantage of. As such, the paper will also look at the very common attack pattern and tools so as to have definite model on how such attacks can be detected in a network attack and to help reduce the effect resultant effects that is always accompanied with it.