{"id":93486,"date":"2022-03-01T03:02:58","date_gmt":"2022-03-01T03:02:58","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2022\/03\/01\/the-cybersecurity-threat-landscape-group-assignment-cmit-495-current-trends-and-projects\/"},"modified":"2022-03-01T03:02:58","modified_gmt":"2022-03-01T03:02:58","slug":"the-cybersecurity-threat-landscape-group-assignment-cmit-495-current-trends-and-projects","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2022\/03\/01\/the-cybersecurity-threat-landscape-group-assignment-cmit-495-current-trends-and-projects\/","title":{"rendered":"The Cybersecurity Threat Landscape Group Assignment CMIT 495: Current Trends and Projects"},"content":{"rendered":"<p>The Cybersecurity Threat Landscape <\/p>\n<p> Group Assignment<\/p>\n<p> CMIT 495: Current Trends and Projects in Computer Networks and Security<\/p>\n<p> [PROFESSOR NAME]<\/p>\n<p> By:<\/p>\n<p> [GROUP MEMBER NAMES]<\/p>\n<p> Part 5: Using Machine Learning and Data Analytics to Prevent APT<\/p>\n<p> Describe how machine learning and data analytics could have detected and\/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.<\/p>\n<p> Part 6: Ethics in Cybersecurity<\/p>\n<p> Do you think the vulnerability(ies) exploited by the APT constitute an ethical failure by the defender? Why or why not?<\/p>\n<p> For the APT your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A? If not, what ethically significant harms could result from the scenario your group researched?<\/p>\n<p> For the APT your group studied, when the targeted organization identified the breach, was the disclosure made with transparency? Do you feel the organization acted ethically? Why or why not?<\/p>\n<p> Conclusion<\/p>\n<p> References<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity Threat Landscape Group Assignment CMIT 495: Current Trends and Projects in Computer Networks and Security [PROFESSOR NAME] By: [GROUP MEMBER NAMES] Part 5: Using Machine Learning and Data Analytics to Prevent APT Describe how machine learning and data analytics could have detected and\/or prevented the APT you analyzed had the victim organization deployed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-93486","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/93486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=93486"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/93486\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=93486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=93486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=93486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}