Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors. Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team. This is a team assignment, and the team members that were selected by the instructor in the previous assignment will work together. It is up to the team members to decide who is responsible for contributing to the sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. Note that you are required to complete a peer review for yourself and for each member of the team. The peer review template is provided in the Activities folder. Your team’s report should use the The Cybersecurity Threat Landscape Team Assignment Resources to cover the following five areas: Part 1: Threat Landscape Analysis
Part 2: APT Analysis
Part 3: Cybersecurity Tools, Tactics, and Procedures
Part 4: Machine Learning and Data Analytics
Part 5: Using Machine Learning and Data Analytics to Prevent APT
Part 6: Ethics in Cybersecurity
Notes
Submitting Your Work
|
||
Rubric Name: Project 4: The Cybersecurity Threat Landscape Team Assignment
Evaluation Criteria |
Exceeds
10 points
|
Meets
8.5 points
|
Approaches
7.5 points
|
Does not Meet
0 points
|
Criterion Score
|
---|---|---|---|---|---|
1.1.3: Present ideas in a clear, logical order appropriate to the task.
|
Presents a logical flow of ideas that is easily identifiable and completely appropriate to the task. |
Presents ideas in a clear, logical order appropriate to the task. |
Attempts to present ideas, but the logic is not clear and/or not appropriate to the task. |
Does not present ideas in a clear, logical order appropriate to the task. |
Score of 1.1.3: Present ideas in a clear, logical order appropriate to the task.,
/ 10 |
2.1.3: Explain the significance of the issue or problem.
|
Explains the significance of the issue or problem succinctly and thoroughly. |
Explains the significance of the issue or problem. |
Attempts to explain the significance of the issue or problem, but the explanation is not clear or is not appropriate for the context. |
Does not explain the significance of the issue or problem. |
Score of 2.1.3: Explain the significance of the issue or problem.,
/ 10 |
4.1.1: Establish a collaborative approach for working together as a team.
|
Establishes an inclusive and highly collaborative approach for working together as a team. |
Establishes a collaborative approach for working together as a team. |
Attempts to establish an approach for working together as a team, but it is not fully collaborative and/or inclusive. |
Does not establish a collaborative approach for working together as a team. |
Score of 4.1.1: Establish a collaborative approach for working together as a team.,
/ 10 |
4.2.4: Prepare a finished teamwork product.
|
Prepares a polished and thorough finished team work product. |
Prepares a finished team work product. |
Attempts to prepare a team work product but it is not fully finished or polished. |
Does not prepare a finished team work product. |
Score of 4.2.4: Prepare a finished teamwork product.,
/ 10 |
10.1.1: Identify the problem to be solved.
|
Presents a relevant IT problem clearly and specifically. |
Presents an IT problem that requires a solution. |
Identifies an IT problem but may lack clarity and/or specificity regarding the need to be addressed. |
Does not identify an IT problem to be solved. |
Score of 10.1.1: Identify the problem to be solved.,
/ 10 |
12.6.1: Identify the controls needed for confidentiality.
|
Thoroughly explains in detail the controls needed for confidentiality. |
Identifies the controls needed for confidentiality. |
Identifies some controls for confidentiality, but there are gaps in the explanation, and/or the explanation may not be completely accurate. |
Does not identify the controls needed for confidentiality. |
Score of 12.6.1: Identify the controls needed for confidentiality.,
/ 10 |
12.6.2: Identify the controls needed for integrity.
|
Thoroughly explains in detail the controls needed for integrity. |
Identifies the controls needed for integrity. |
Identifies some controls for integrity, but there are gaps in the explanation, and/or the explanation may not be completely accurate. |
Does not identify the controls needed for integrity. |
Score of 12.6.2: Identify the controls needed for integrity.,
/ 10 |
12.6.3: Identify the controls needed for availability.
|
Thoroughly explains in detail the controls needed for availability. |
Identifies the controls needed for availability. |
Identifies some controls for availability, but there are gaps in the explanation, and/or the explanation may not be completely accurate. |
Does not identify the controls needed for availability. |
Score of 12.6.3: Identify the controls needed for availability.,
/ 10 |
12.7.2: Explain the process of analyzing IT incidents.
|
Provides detailed and comprehensive explanations about the process of analyzing IT incidents. |
Explains the process of analyzing IT incidents. |
Attempts to explain the process of analyzing IT incidents, but some analysis is incomplete or inaccurate, or detail is lacking. |
Does not explain the process of analyzing IT incidents. |
Score of 12.7.2: Explain the process of analyzing IT incidents.,
/ 10 |
14.1.1: Explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society.
|
Provides detailed explanations about how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society. |
Explains how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society. |
Attempts to explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society but does not articulate the issues clearly or thoroughly. |
Does not explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society. |
Score of 14.1.1: Explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society.,
/ 10 |
/ 100