esearch a threat actor and produce a 2-page threat intelligence report on that threat actor. You can find a list of threat actors on the MITRE ATTACK Framework page: Groups. As part of this threat report, make sure you document the threat actor’s names, geographical location, associations, and motivations (organized crime, state actors), types of targets (finance, health care, government, military, retail, infrastructure, etc.), and TTPs (methods of intrusions, associated tools or malware, type of data stolen, types of internet infrastructure used in the attack, etc.). You can use Mandiant’s threat reports on APT1 and APT37 as examples of the type of data included, though your threat report should be much shorter. The reports are found at the following web pages: APT1: Exposing One of China’s Cyber Espionage Units and APT37 (REAPER) The Overlooked North Korean Actor. Also, note that you do not have to exclusively use the MITRE page, but be sure that you take note of the Associated Groups column, which lists aliases of the name given by MITRE. Different intelligence groups sometimes give the same threat actor different names, so other sources used for your report may use one of these alternate names. Finally, make sure you include appropriate APA in-text citations and a reference page. https://attack.mitre.org/groups/