This is the Scenario: “Machine learning,” says Steve. “We need to leverage machine learning if we want to stay ahead of advanced persistent threats. A human specialist just can’t keep track of every possible opening in a network. It’s impossible.”
“And we need to think about data analytics,” adds Bill. “We need to consider how people are using our network and track what people are trying to access. Our systems store all of that information—we just have to use it intelligently.”
This time, Steve and Bill both look to you. “We have about a week before we need to submit this white paper. Can you cover these two topics for the team?”
INSTRUCTIONS:
Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.
Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, APT32.
I have been asked to report on the following subjects:
Cybersecurity Tools, Tactics, and Procedures
– Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
– Consider the hardware and software solutions deployed today in the context of defense-in-depth.
– Elaborate on why these devices are not successful against the APTs.
Part 4: Machine Learning and Data Analytics
– Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
– Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?
Extra information:
– Use additional sources of information but also describe the concept in layman’s terms.
– Use visuals where appropriate.
About 2 pages a topic should be good here.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount