11 May For this assignment, you will categorize the content in open sources ?such as MITRE ATT&CK and its implications plus options & their ?’Groups,’ th
For this assignment, you will categorize the content in open sources such as MITRE ATT&CK and its implications plus options & their "Groups," the Verizon DBIR, CISCO Cyberthreat reports, Cisco Talos, Crowdstrike, DHS's CISA advisories, and other leading quality Internet sources. Add peer-reviewed research literature to select current insights published within the last 2 years.
In your assignment, be sure to address the following:
- Combine your selection of known global threat sources, objectives, and capabilities to form a reasonable baseline of concerns for one specified organization that has no less than 10,000 employees or has a financial budget exceeding $1 billion.
- Identify the critical industry for the organization.
- Avoid the assumption that one should focus on a few recent cyber incidents or tactics.
- Pursue the value at risk for the organization, not popular conceptions.
A formal paper is suitable for delivery to the CIO and CISO and their teams of your specified organization. You should act as a consultant (internal or external to the organization) in formulating your response. Add no less than one table beyond the narrative content provided above.
Length: 6 pages, not including title and reference pages, include at least one table
References: Include a minimum of 6 scholarly references. You can cite 4 from the course, but also cite at least 2 different peer-reviewed academic research studies relevant to your approach for this assignment. These specified references should not be in this course and have been published in the last two years.
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and include a plagiarism report.
- Matrices
- Tactics Enterprise Mobile ICS
- Techniques Enterprise Mobile ICS
- Data Sources
- Mitigations Enterprise Mobile ICS
- Groups
- Software
- Resources General Information Getting Started Training ATT&CKcon Working with ATT&CK FAQ Updates Versions of ATT&CK Related Projects
- Blog
- Contribute
- Search
The new v11.0 release of MITRE ATT&CK contains a beta version of Sub-Techniques for Mobile. The current, stable Mobile content can be accessed via the v10 release URL. GROUPS Overview [email protected] Ajax Security Team ALLANITE Andariel APT-C-36 APT1 APT12 APT16 APT17 APT18 APT19 APT28 APT29 APT3 APT30 APT32 APT33 APT37 APT38 APT39 APT41 Aquatic Panda Axiom BackdoorDiplomacy BlackOasis BlackTech Blue Mockingbird Bouncing Golf BRONZE BUTLER Carbanak Chimera Cleaver Cobalt Group Confucius CopyKittens CostaRicto Dark Caracal Darkhotel DarkHydrus DarkVishnya Deep Panda Dragonfly DragonOK Dust Storm Elderwood Equation Evilnum Ferocious Kitten FIN10 FIN4 FIN5 FIN6 FIN7 FIN8 Fox Kitten Frankenstein GALLIUM Gallmaker Gamaredon Group GCMAN Gelsemium GOLD SOUTHFIELD Gorgon Group Group5 HAFNIUM HEXANE Higaisa Honeybee Inception IndigoZebra Indrik Spider Ke3chang Kimsuky Lazarus Group LazyScripter Leafminer Leviathan Lotus Blossom Machete Magic Hound menuPass Moafee Mofang Molerats MuddyWater Mustang Panda Naikon NEODYMIUM Night Dragon Nomadic Octopus OilRig Operation Wocao Orangeworm Patchwork PittyTiger PLATINUM Poseidon Group PROMETHIUM Putter Panda Rancor Rocke RTM Sandworm Team Scarlet Mimic Sharpshooter Sidewinder Silence Silent Librarian SilverTerrier Sowbug Stealth Falcon Strider Suckfly TA459 TA505 TA551 TeamTNT TEMP.Veles The White Company Threat Group-1314 Threat Group-3390 Thrip Tonto Team Transparent Tribe Tropic Trooper Turla Volatile Cedar Whitefly Windigo Windshift Winnti Group WIRTE Wizard Spider ZIRCONIUM GROUPS Overview A-B [email protected] Ajax Security Team ALLANITE Andariel APT-C-36 APT1 APT12 APT16 APT17 APT18 APT19 APT28 APT29 APT3 APT30 APT32 <a