{"id":37648,"date":"2024-11-12T08:50:22","date_gmt":"2024-11-12T08:50:22","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/core550writing-assignment-compare-ttps-between-two-cyber-threat-intrusion-campaigns\/"},"modified":"2024-11-12T08:50:22","modified_gmt":"2024-11-12T08:50:22","slug":"core550writing-assignment-compare-ttps-between-two-cyber-threat-intrusion-campaigns","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/core550writing-assignment-compare-ttps-between-two-cyber-threat-intrusion-campaigns\/","title":{"rendered":"CORE550:Writing Assignment: Compare TTPs Between Two Cyber Threat Intrusion Campaigns"},"content":{"rendered":"<h2 style=\"margin: 6px 0px; font-size: 1.8em; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\">Activity Directions<\/h2>\n<p style=\"margin: 12px 0px; cursor: auto;\">The purpose of this assignment is to demonstrate your ability to compare and contrast cyber threat actors\u2019 Indicators of Compromise (IOC\u2019s) and known tactics, techniques and procedures (TTPs) between two cyber intrusion campaigns.&nbsp;<\/p>\n<p style=\"margin: 12px 0px; cursor: auto;\">Compare and contrast the activity described in the following two cyber intrusion campaigns:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" aria-level=\"1\"><strong style=\"font-weight: bold; cursor: auto;\">Campaign 1<span style=\"cursor: auto;\">&nbsp;<\/span><\/strong>(both links)\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" aria-level=\"1\"><a style=\"cursor: auto;\"><span style=\"cursor: auto;\">Advanced Persistent Threat Activity Exploiting Managed Service Providers<\/span><span style=\"cursor: auto;\"><span style=\"margin: -1px; cursor: auto;\">Links to an external site.-https:\/\/us-cert.cisa.gov\/ncas\/alerts\/TA18-276B&nbsp;<\/span><\/span><\/a><\/li>\n<li style=\"cursor: auto;\" aria-level=\"1\"><a style=\"cursor: auto;\"><span style=\"cursor: auto;\">APTs Targeting IT Service Provider Customers | CISA<\/span><span style=\"cursor: auto;\"><span style=\"margin: -1px; cursor: auto;\">Links to an external site.<\/span><\/span><\/a>&nbsp;&nbsp;https:\/\/www.cisa.gov\/news-events\/alerts\/2018\/10\/03\/apts-targeting-it-service-provider-customers<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto;\" aria-level=\"1\"><strong style=\"font-weight: bold; cursor: auto;\">Campaign 2<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" aria-level=\"1\"><a style=\"cursor: auto;\"><span style=\"cursor: auto;\">CISA Publishes Eviction Guidance for Networks Affected by SolarWinds and AD\/M365 Compromise | CISA<\/span><span style=\"cursor: auto;\"><span style=\"margin: -1px; cursor: auto;\">Links to an external site.<\/span><\/span><\/a>&nbsp;&nbsp;https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/05\/14\/cisa-publishes-eviction-guidance-networks-affected-solarwinds-and<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto;\">Respond to the following prompts:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" aria-level=\"1\">Compare the TTPs attributed to the two campaigns. What are the similarities and differences?<\/li>\n<li style=\"cursor: auto;\" aria-level=\"1\">Using the same organization you selected in Module 1, assess the possibility that your organization might also be targeted in this campaign.<\/li>\n<li style=\"cursor: auto;\" aria-level=\"1\">If you suspected your organization might be targeted, what steps would you take to further assess positively or negatively?&nbsp; What information from your organization would you need in order to assess whether there has been any impact?<\/li>\n<\/ul>\n<div>\n<h3 style=\"margin: 6px 0px; font-size: 1.5em; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\">Criteria and Requirements<\/h3>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" aria-level=\"1\">Title page<\/li>\n<li style=\"cursor: auto;\" aria-level=\"1\">Length<\/li>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" aria-level=\"2\">Undergraduate: 2 pages, double-spaced<\/li>\n<\/ul>\n<li style=\"cursor: auto;\" aria-level=\"1\">References page&nbsp;<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Activity Directions The purpose of this assignment is to demonstrate your ability to compare and contrast cyber threat actors\u2019 Indicators of Compromise (IOC\u2019s) and known tactics, techniques and procedures (TTPs) between two cyber intrusion campaigns.&nbsp; Compare and contrast the activity described in the following two cyber intrusion campaigns: Campaign 1&nbsp;(both links) Advanced Persistent Threat Activity [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/37648"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=37648"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/37648\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=37648"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=37648"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=37648"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=37648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}