Analyze the advanced persistent threats


Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following document titled, "APT Summit Findings", as well as the document titled "RSA Security Brief".

Write a five to eight (5-6) page paper in which you:

1.Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system.
2.Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why.
3.Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization.
4.Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization.
5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resource

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Analyze the advanced persistent threats
Reference No:- TGS086125

Expected delivery within 24 Hours