UMUC Technological Advancements in Cybersecurity Essay.
I need support with this Computer Science question so I can learn better.
Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.
Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT. Your APT will be APT 38, aka, un-usual suspects. APT 38 is a financially motived North Korean regime-backed group.
Your part of the assignment will be:
Part 1: Introduction to APTs
Identify the problem to be solved.
Explain the significance of the issue or problem.
Part 2: Threat Landscape Analysis
Provide a detailed analysis of the threat landscape.
What has changed over the past year?
Describe common tactics, techniques, and procedures to include threat actor types.
What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?
Also, use additional sources of information but also describe the concept in layman’s terms and use visuals where appropriate.
Attached are two examples and a PDF of what APT 38 is.