2. Analyze the attack methods carried out in pursuit of the
authentication breach and explain which methods were
successful and why.
3. Suggest three (3) techniques or methods to protect against
APT attacks in the future as the CSO for a large organization.
4. Determine what types of technologies would help alleviate
the problems identified in the articles assuming you are the
CSO or CTO in an organization.
5. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as
quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman
font (size 12), with one-inch margins on all sides; citations
and references must follow APA or school-specific format.
Check with your professor for any additional instructions.
Include a cover page containing the title of the
assignment, the student’s name, the professor’s name, the