Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.

Cybersecurity Tools, Tactics, and Procedures

Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.

Consider the hardware and software solutions deployed today in the context of defense-in-depth.

Elaborate on why these devices are not successful against the APT 28.

Scenario:
“But,” she adds, “this also increases the chance that our company will be a target for hackers and online attacks. If we are going to move forward, we need to anticipate those problems before they happen.

In particular, we are especially worried about advanced persistent threats (APTs).