Cybersecurity Threat Landscape


Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.
Answer the following:

1. Provide a detailed analysis of the threat landscape in 2018.

2. What has changed since 2017?

3. Describe common tactics, techniques, and procedures to include threat actor types.

3. What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Sample Answer

 

Since the introduction of internet, many problems of insecurity has been experienced in firms, organizations and even individual basis. In the recent times, Advanced Persistent Threat (APTs) has been reported tremendously. In this paper, a detailed analysis of the resultant threat landscape is discussed, along with the advantages that the threat causers are often taking advantage of. As such, the paper will also look at the very common attack pattern and tools so as to have definite model on how such attacks can be detected in a network attack and to help reduce the effect resultant effects that is always accompanied with it.

The essential motivation behind pressure is that we can bar information with insignificant number of numbers as per human visual observation (HVP) [2]. An advanced picture has information contain are repetitive and insignificant data. For decreasing excess we simply center around expelling replication from the wellspring of the picture then again, information signals which is excluded from source evacuate that sign isn't gotten by the collector, for example, human visual observation (HVP) is called superfluity decrease. Taking out the repetitive data from the picture sparing of extra room of a picture.

The measure of advanced information and goals expanding step by step since standard diminishes information, different measures of information standard like MPEG-4, MPEG-7 and MPEG-21 after extra functionalities [3].

The three fundamental information excess to be specific spatial repetition, which is characterized spatial lessening picture size by utilizing fewer bits and furthermore connection between's neighbor pixel esteems, Spectral excess, Spectral which characterizing relationship between's various shading, Temporal excess, which is characterizing connection between's various edge in arrangement of picture [4].

The pressure strategies, structure for future difficulties and advance application for media and correspondence framework. There are a few pressure methods, yet the principle two classifications are lossless and lossy pressure procedures. Lossless pressure there is no loss of data from picture. Lossless gives 100% recuperation information from the first information then again the lossy pressure system gives a high pressure proportion [5-9].

Figure 1: Research Trends of Multimedia Compression Techniques [10].

II. Pressure ALGORETHM

Computerized picture pressure is the significant research territories due to constantly expanding different applications in various fields. This Section survey the computerized pressure calculation.

A LOSSLESS COMPRESSION TECHNIQUE

The need of lossless pressure procedures is required in numerous applications such in medicinal information there were no loss of data. Lossless pressure diminishes extra room without corrupting picture and time required for computational will likewise diminish. The Lossless picture pressure calculation for various application like restorative picture, Lossless interframe coding for

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.