Georgetown University Cyber Security Essay
Description
part 1 Writeup, 500 words or less: Evaluate objectives and tactics of either Muddy Water or the threat actors behind the TajMahal Framework. Look for different motives and tactics depending on origin of sophisticated attacks. Try to focus on attacks that are targeted in some way – nation, organization, or objective (industrial controls – uranium). Where did the nation/nation state threat actors look to focus the attack? Was it to be effective and remain undetected? Why might the attack have been less focused? What was the length of time it remained undetected? Why do you think it went undetected for that period of time? Include a list of references and sources with your submission.
Part 2:
Answer questions: Respond to the following: The exfiltration of data associated with threat actor groups from China is not an uncommon theme. APT type attacks for intellectual property theft as described in the Thomas Schreck interview have been seen from other threat actor groups from China as well. This week, we are reviewing the Middle East, where a range of attacks have occurred as well as originated some targeting oil and other industries as well as the government.
- Compare the threat actor motivations and tactics between APT groups to understand their targets. How does culture play into the motivations and methods of attack? Include APT groups from the Middle East.
- Has there been change over time in the types of attacks?
- What impact if any do trade sanctions and policies have on the proliferance of attacks (infiltrated equipment, supply chain, direct APTs)?
- Is there a logical mapping from traditional military and force to online capabilities and tactics (nation-state sponsored activities for Middle East nations and other nations studied to date)?
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."