CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 24
1. Analyze the Advanced Persistent Threats (APT) Summit
Findings article as well as the RSA Security Brief article and
identify the vulnerabilities that existed in the system.
2. Analyze the attack methods carried out in pursuit of the
authentication breach and explain which methods were
successful and why.
3. Suggest three (3) techniques or methods to protect against
APT attacks in the future as the CSO for a large organization.
4. Determine what types of technologies would help alleviate the
problems identified in the articles assuming you are the CSO or
CTO in an organization.
5. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman
font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check
with your professor for any additional instructions.
Include a cover page containing the title of the
assignment, the student’s name, the professor’s name, the course
title, and the date. The cover page and the reference page are not
included in the required assignment page length. The specific
course learning outcomes associated with this assignment are: