APT Analysis

o Provide a detailed analysis and description of the APT your group was assigned. Describe the specific tactics used to gain access to the target(s).
o Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Part 3: Cybers-ecurity Tools, Tactics, and Procedures

o Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
o Consider the hardware and software solutions deployed today in the context of defense-in-depth.
o Elaborate on why these devices are not successful against the APTs.